With over 360,000 readers consuming our initial threat analysis of Log4j, the Unit 42 Threat Intelligence team continues to publish factual information on best practices for your mitigations, as well as research on exploits we've seen targeting Log4Shell.
Palo Alto Networks customers are protected from attacks exploiting the Apache Log4j remote code execution (RCE)
vulnerability. In addition, we offer a number of solutions to help identify affected applications and incident response
if needed. Here’s how we help:
Blocking the Exploit: To give you time while your teams patch the vulnerabilities, Palo Alto Networks
customers are protected by our Next-Generation Firewalls (PA-Series, VM-Series and CN-Series) or Prisma Access with a Threat Prevention security subscription,
Cortex® XDR™ and Prisma® Cloud.
Incident Scoping: Palo Alto Networks can help provide this visibility using Prisma Cloud, Cortex XSOAR
and Cortex Xpanse.
Incident Response: Our IR services can help companies of any size investigate and remediate potential
threat actor activity.
If you suspect you may be impacted by the Log4j vulnerability, fill out the form to get in touch with the Unit 42 Incident Response team. If you have a cyber insurance provider or legal counsel, you can request Unit 42 by name to help you investigate this matter.
A Unit 42 team member will reach out to you shortly.
Get the latest news, invites to events and threat alerts