Log4Shell Vulnerability: What We Know and Action Steps to Take