The Application Attack Threat Landscape – After Log4J