Log4j Vulnerability Explained by a Cybersecurity Expert