Threat Research Juniper Networks

  • Threat Hunting with passive DNS: Discovering the Attacker Infrastructure
    by Omar on December 9, 2024 at 4:00 pm

    Official Juniper Networks Blogs Threat Hunting with passive DNS: Discovering the Attacker Infrastructure Understanding how attackers establish and maintain their attack infrastructure is important for building robust defenses. Attackers employ various tactics to keep their operations resilient and undetected. In this blog post, The post Threat Hunting with passive DNS: Discovering the Attacker Infrastructure appeared first on Official Juniper Networks Blogs.

  • The Hidden Door: How CVE-2024-23897 Enabled Ransomware Attack on Indian Banks
    by Shwetanjali Rasal on August 13, 2024 at 1:00 pm

    Official Juniper Networks Blogs The Hidden Door: How CVE-2024-23897 Enabled Ransomware Attack on Indian Banks On August 1, 2024, Retail payments began to be disrupted in Indian banks and suddenly, massive news broke, stating Brontoo Technology Solutions – a collaborator with C-Edge Technologies, which is The post The Hidden Door: How CVE-2024-23897 Enabled Ransomware Attack on Indian Banks appeared first on Official Juniper Networks Blogs.

  • BianLian Ransomware Group: 2024 Activity Analysis
    by Paul Kimayong on July 11, 2024 at 1:00 pm

    Official Juniper Networks Blogs BianLian Ransomware Group: 2024 Activity Analysis Since its emergence in 2022, the BianLian ransomware group has rapidly evolved, showcasing sophisticated techniques and adapting to the shifting landscape of cyber threats. It’s among the top three most The post BianLian Ransomware Group: 2024 Activity Analysis appeared first on Official Juniper Networks Blogs.

  • Protecting Networks from Opportunistic Ivanti Pulse Secure Vulnerability Exploitation
    by Kashinath T Pattan on May 7, 2024 at 1:30 pm

    Official Juniper Networks Blogs Protecting Networks from Opportunistic Ivanti Pulse Secure Vulnerability Exploitation   Juniper Threat Labs has been monitoring exploitation attempts targeting an Ivanti Pulse Secure authentication bypass with remote code execution vulnerabilities. We have observed instances of Mirai botnet delivery in The post Protecting Networks from Opportunistic Ivanti Pulse Secure Vulnerability Exploitation appeared first on Official Juniper Networks Blogs.

  • Shielding Networks From Androxgh0st
    by Kashinath T Pattan on March 19, 2024 at 9:02 am

    Official Juniper Networks Blogs Shielding Networks From Androxgh0st   AndroxGh0st is a Python-based malware designed to target Laravel applications. It works by scanning and taking out important information from .env files, revealing login details linked to AWS and The post Shielding Networks From Androxgh0st appeared first on Official Juniper Networks Blogs.

  • Real-Time Defense: Analyzing Emerging Cyber Threats
    by Omar on February 1, 2024 at 7:30 pm

    Official Juniper Networks Blogs Real-Time Defense: Analyzing Emerging Cyber Threats In this blog, we will dive into the attack trends observed across our customers’ networks. First, we will highlight how the security threat intelligence in the Juniper Advanced Threat Prevention The post Real-Time Defense: Analyzing Emerging Cyber Threats appeared first on Official Juniper Networks Blogs.

  • CVE-2023-20887: VMware Aria Operations for Networks Unauthenticated Remote Code Execution
    by Ashish Joshi on September 20, 2023 at 7:56 am

    Official Juniper Networks Blogs CVE-2023-20887: VMware Aria Operations for Networks Unauthenticated Remote Code Execution VMware Aria Operations for Networks is a network monitoring and management tool used to build and manage an optimized, secure network infrastructure. A command injection vulnerability has been recently reported The post CVE-2023-20887: VMware Aria Operations for Networks Unauthenticated Remote Code Execution appeared first on Official Juniper Networks Blogs.

  • Abused CDNs: From Speedy Content to Stealthy Malware
    by Omar on September 5, 2023 at 6:19 pm

    Official Juniper Networks Blogs Abused CDNs: From Speedy Content to Stealthy Malware The global internet relies on Content Delivery Networks (CDNs) to deliver a seamless web experience for users. Because of the shared nature of a CDN’s resources, network operators must be The post Abused CDNs: From Speedy Content to Stealthy Malware appeared first on Official Juniper Networks Blogs.

  • DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability
    by Paul Kimayong on August 28, 2023 at 1:00 pm

    Official Juniper Networks Blogs DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability In May 2023, a vulnerability affecting RocketMQ servers (CVE-2023-33246), which allows remote code execution, was publicly disclosed. In a recent blog post, Juniper Threat Labs provided a detailed explanation of The post DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability appeared first on Official Juniper Networks Blogs.

  • CVE-2023-27350: PaperCut NG and MF Remote Code Execution Vulnerability
    by Ashish Joshi on July 19, 2023 at 10:00 am

    Official Juniper Networks Blogs CVE-2023-27350: PaperCut NG and MF Remote Code Execution Vulnerability PaperCut is an enterprise print management software. PaperCut NG is used for managing and controlling printing. PaperCut MF is a more advanced solution that, in addition to managing printing, can The post CVE-2023-27350: PaperCut NG and MF Remote Code Execution Vulnerability appeared first on Official Juniper Networks Blogs.

Share Websitecyber