Log4j (aka "Log4Shell") Resource Center

We’re here to help.

Unit 42 Log4j Threat Analysis

With over 360,000 readers consuming our initial threat analysis of Log4j, the Unit 42 Threat Intelligence team continues to publish factual information on best practices for your mitigations, as well as research on exploits we've seen targeting Log4Shell.
Log4J Threat Analysis

How Palo Alto Networks Customers Are Protected

Palo Alto Networks customers are protected from attacks exploiting the Apache Log4j remote code execution (RCE) vulnerability. In addition, we offer a number of solutions to help identify affected applications and incident response if needed. Here’s how we help:
  • Blocking the Exploit: To give you time while your teams patch the vulnerabilities, Palo Alto Networks customers are protected by our Next-Generation Firewalls (PA-Series, VM-Series and CN-Series) or Prisma Access with a Threat Prevention security subscription, Cortex® XDR™ and Prisma® Cloud.
  • Incident Scoping: Palo Alto Networks can help provide this visibility using Prisma Cloud, Cortex XSOAR and Cortex Xpanse.
  • Incident Response: Our IR services can help companies of any size investigate and remediate potential threat actor activity.

ASSESS & RESPOND

Unit 42 Log4Shell Compromise Assessment

Assess your exposure, investigate and remediate.