novalis

Hunting for Log4j CVE-2021-44228 (Log4Shell) Exploit Activity

The implications of the #Log4j vulnerability are enormous. Thousands of software applications, including well-known commercial applications from some of the biggest names in business software, are vulnerable to being hacked and used for malicious purposes.

You can’t afford to be reactive. Read the @Palo Alto Networks blog for some proactive insights. Let us know if you’d like to talk to one of our Palo Alto Networks experts about how Novalis can help you assess and mitigate your Log4j risk.

#cybersecurity #SecuredByPANW

Continue Reading

Log4Shell Compromise Assessment

Is your organization protected from attacks exploiting the Apache #Log4j remote code execution (RCE) vulnerability?

@Palo Alto Networks offers world-class investigative expertise to identify the Log4j vulnerability, hunt for threats and reduce uncertainty.

Read the datasheet and reach out to a Novalis @Unit 42 by Palo Alto Networks expert to address your cybersecurity priorities.

Continue Reading

Top Questions Your C-Suite and Board Will Ask About Log4j

The number of threat actors exploiting the #Log4j vulnerability continues to grow.

@Unit 42 by Palo Alto Networks Team can walk you through the critical next steps in communicating your organization’s response and mitigation plans to your C-Suite and Board—because they will certainly be asking you about it, if they haven’t already.

Watch the webinar and let us know in the comments if you’d like to discuss scheduling an assessment with an expert from Novalis.

#SecuredByPANW #Cybersecurity

Continue Reading