Hunting for Log4j CVE-2021-44228 (Log4Shell) Exploit Activity
With Log4j, it is essential to detect the threat activity as the vulnerability is exploited or as attackers successfully insert themselves into your environment. This is where the efficacy of your security tools is put to the test.
You can’t afford to be reactive. Read the @Palo Alto Networks blog for some proactive insights. Let us know if you’d like to talk to one of our Palo Alto Networks experts about how Comtasq can help you assess and mitigate your Log4j risk.
#cybersecurity #SecuredByPANW