Addressing Apache Log4j Vulnerability with NGFW and Cloud-Delivered Security Services

This blog examines how unauthenticated attackers can exploit Log4j and force a vulnerable system to download malicious software, enabling them to take control of servers located within enterprise networks.

Read the blog for a comprehensive overview of what the Log4j threat entails and for an introduction to the tools and tactics necessary to combat it. Contact a Novalis Palo Alto Networks consultant to discuss next steps.

Read More…