Since its emergence in 2022, the BianLian ransomware group has rapidly evolved, showcasing sophisticated techniques and adapting to the shifting landscape of cyber threats. It’s among the top three most
![Security and Networking Teams, Meet Collaborative Engagement](https://blogs.juniper.net/wp-content/uploads/2024/06/Mike-Blog-Featured-Image.png)
For the last 20 years, networking and security teams have had quite a tumultuous relationship thanks to vastly different objectives and/or impact on the other when completing necessary tasks. Security
![Introducing New Security Insights Within Juniper Mist Premium Analytics: A Bridge for Network and Security Teams’ Visibility Challenges](https://blogs.juniper.net/wp-content/uploads/2024/06/Mike-Spanbauer-Mega-Launch-Blog-1800x900-1.png)
Let’s face it, organizations often struggle to address unwanted behaviors on the network while minimizing their potential impact. Ideally, incidents would be addressed in real-time with automated responses to prevent
![Protecting Networks from Opportunistic Ivanti Pulse Secure Vulnerability Exploitation](https://blogs.juniper.net/wp-content/uploads/2024/04/MicrosoftTeams-image-4.png)
Juniper Threat Labs has been monitoring exploitation attempts targeting an Ivanti Pulse Secure authentication bypass with remote code execution vulnerabilities. We have observed instances of Mirai botnet delivery in
![Shielding Networks From Androxgh0st](https://blogs.juniper.net/wp-content/uploads/2024/03/240100-DIGITAL-Threat-Labs-Shielding-Networks-830x463-v3.1.png)
AndroxGh0st is a Python-based malware designed to target Laravel applications. It works by scanning and taking out important information from .env files, revealing login details linked to AWS and
![Juniper Networks Evolves Modern Data Center Security with the Industry’s First Distributed Security Services Architecture](https://blogs.juniper.net/wp-content/uploads/2023/10/Firefly_WP_Test3.png)
What happens when data, the crown jewel of any business, moves from a centralized, self-contained data center to multiple distributed locations? It becomes harder to manage and secure. This is
![CVE-2023-20887: VMware Aria Operations for Networks Unauthenticated Remote Code Execution](https://blogs.juniper.net/wp-content/uploads/2023/09/230469_DIGITAL_Threat-Labs-Blog-Image-CVE-2023-20887_v1.1.jpg)
VMware Aria Operations for Networks is a network monitoring and management tool used to build and manage an optimized, secure network infrastructure. A command injection vulnerability has been recently reported
![Abused CDNs: From Speedy Content to Stealthy Malware](https://blogs.juniper.net/wp-content/uploads/2023/08/banner_CDN.png)
The global internet relies on Content Delivery Networks (CDNs) to deliver a seamless web experience for users. Because of the shared nature of a CDN’s resources, network operators must be
![DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability](https://blogs.juniper.net/wp-content/uploads/2023/07/cover.png)
In May 2023, a vulnerability affecting RocketMQ servers (CVE-2023-33246), which allows remote code execution, was publicly disclosed. In a recent blog post, Juniper Threat Labs provided a detailed explanation of