Log4j (aka "Log4Shell") Resource Center

We’re here to help.

Unit 42 Log4j Threat Analysis

With over 360,000 readers consuming our initial threat analysis of Log4j, the Unit 42 Threat Intelligence team continues to publish factual information on best practices for your mitigations, as well as research on exploits we've seen targeting Log4Shell.
Log4J Threat Analysis

How Palo Alto Networks Customers Are Protected

Palo Alto Networks customers are protected from attacks exploiting the Apache Log4j remote code execution (RCE) vulnerability. In addition, we offer a number of solutions to help identify affected applications and incident response if needed. Here’s how we help:


Unit 42 Log4Shell Compromise Assessment

Assess your exposure, investigate and remediate.