Juniper Networks and Corero Network Security Bring Leading DDoS Protection to New Platforms, New Types of Attacks

Did you know that Distributed Denial-of-Service (DDoS) attacks are one of the fastest ways for cybercriminals to bring down a digital business? Scan the news for “DDoS attack,” and you’ll

Share
Asbit: An Emerging Remote Desktop Trojan

Introduction   Juniper Threat Labs is currently monitoring an emerging Chinese Remote Desktop Trojan called Asbit. It’s a remote access Trojan being advertised on its developer’s website as a “Fast

Share
Can You Trust that Test Report?

Whether at work or our personal lives, we want to purchase a product that performs as advertised and gets the job done. Fortunately for consumers, there are excellent resources that

Share
CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

A zero-day vulnerability was discovered on Microsoft Windows Support Diagnostic Tool (MSDT).  On May 27, a researcher who goes by the twitter handle nao_sec discovered an interesting Microsoft Word document

Share
Simplifying the SASE Experience with Juniper Networks

With networks becoming more distributed and complex, and IT resourcing either remaining flat or declining, networking and security teams have to do more without actually having more. Secure Access Service

Share
Executive Order 14028 on Improving National Cybersecurity – Explained

On May 12, 2021, United States President, Joe Biden, signed Executive Order 14028 to address the increasing nature of cybersecurity attacks and the effect that they have on businesses, the

Share
Muhstik Gang targets Redis Servers

Juniper Threat Labs has uncovered an attack that targets Redis Servers using a recently disclosed vulnerability, namely CVE-2022-0543. This vulnerability exists in some Redis Debian packages. The attack started on

Share
Juniper Takes the Edge Off SASE Migration with New Cloud-Delivered Firewall Services, Designed for Anytime/Anywhere Workforce Protection

As more companies embrace a Work-From-Anywhere (WFA) workforce, new cloud-based architectures are required to secure the network edge. However, many organizations are hesitant to walk toward SASE for fear of

Share
Log4j Attack Payloads In The Wild

Juniper Threat Labs compiled a list of the payloads from log4j attacks we have seen as of 12/16. Most of the payloads install malware such as Muhstik, Kinsing, Mirai and

Share
Log4j Vulnerability: Attackers Shift Focus From LDAP to RMI

In a previous post, we discussed the Log4j vulnerability CVE-2021-44228 and how the exploit works when the attacker uses a Lightweight Directory Access Protocol (LDAP) service to exploit the vulnerability.

Share