Hunting for Log4j CVE-2021-44228 (Log4Shell) Exploit Activity

With Log4j, it is essential to detect the threat activity as the vulnerability is exploited or as attackers successfully insert themselves into your environment. This is where the efficacy of your security tools is put to the test.

You can’t afford to be reactive. Read the @Palo Alto Networks blog for some proactive insights. Let us know if you’d like to talk to one of our Palo Alto Networks experts about how ThinOps Services can help you assess and mitigate your Log4j risk.

#cybersecurity #SecuredByPANW

Understanding and Responding to the Apache Log4j Vulnerability

The #Log4j flaw is one of the most significant cyber vulnerabilities in recent history—maybe ever. Are you prepared to act and what specifically can your security team do? Listen to this @Palo Alto Networks webinar for strategies on neutralizing this highly menacing #cyberthreat and contact a Palo Alto Networks Log4j expert at ThinOps Services for next steps.

#SecuredByPANW

Colonial pipeline hackers claim breach of 3 more companies

The hacking group blamed for crippling a major U.S. pipeline company has claimed responsibility for breaking into three more companies on Wednesday, saying it was publishing hundreds of gigabytes of data from a Brazilian battery firm, a Chicago-based tech company, and a British engineering firm. Reuters was not immediately able to verify the claims. Messages …