April 21, 2022

If your organization is affected by the #Log4j critical vulnerability, are you: A) Trusting your existing cybersecurity strategy to detect & prevent the threat, or B) Exploring new initiatives to address the threat Tell us ๐Ÿ‘‡.

If your organization is affected by the #Log4j critical vulnerability, are you: A) Trusting your existing cybersecurity strategy to detect & prevent the threat, or B) Exploring new initiatives to address the threat Tell us ๐Ÿ‘‡.

If your organization is affected by the #Log4j critical vulnerability, are you: A) Trusting your existing cybersecurity strategy to detect & prevent the threat, or B) Exploring new initiatives to address the threat Tell us ๐Ÿ‘‡. Read More ยป

Unit 42 Log4Shell Compromise Assessment

The complexity of the Log4j vulnerability is still being unraveled as the Java-based logging utility represents another huge broadside to IT and security departments. Watch the video to learn how Palo Alto Networks’ Unit 42 Log4Shell Compromise Assessment team can help your organization identify, investigate, and contain potentially affected systems. Contact a security consultant at

Unit 42 Log4Shell Compromise Assessment Read More ยป