This blog examines how unauthenticated attackers can exploit Log4j and force a vulnerable system to download malicious software, enabling them to take control of servers located within enterprise networks.
Read the blog for a comprehensive overview of what the Log4j threat entails and for an introduction to the tools and tactics necessary to combat it. Contact a Comtasq Palo Alto Networks consultant to discuss next steps.