The Log4j Vulnerability Explained
Cybersecurity Books and References — A Good InfoSec Reading List
NorthSec CTF write-up — part 2
NorthSec CTF write-up — part 1