Gitpaste-12: a new worming botnet with reverse shell capability spreading via GitHub and Pastebin

Gitpaste-12 is a new worm recently discovered by Juniper Threat Labs, which uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available. There

Share
Juniper’s Attacker IP feed bolsters threat protection with SecIntel

Juniper Threat Labs (JTL) has a network of sensors throughout the world that we use to monitor cyber security threats. These threats can range from Brute Force attacks against logins,

Share
Juniper Strengthens Connected Security Portfolio with New Risk-Based Access Control Capabilities and Remote Access VPN

Do you know who and what is on your network? Throughout my career, whenever I’ve asked this question to IT security leaders, it has almost always been met with an

Share
New pastebin-like service used in multiple malware campaigns

Juniper Threat Labs identified several malware campaigns that rely on a pastebin-like service for its infection chain. The domain in question is paste.nrecom.net. The attacks usually start as a phishing

Share
Priority threat actors  adopt Mirai source code

Mirai has become such a common discovery in the wild that it is beginning to be disregarded as white noise, played off as a simple attack that should be readily

Share
Zeppelin Ransomware returns with a fresh wave of attacks

IT and healthcare providers were targeted in late 2019 by a new ransomware campaign calling itself Zeppelin, a variant of the Buran ransomware-as-a-service family. According to researcher Vitali Kremez, Zeppelin

Share
Juniper Networks Brings Converged Industrial Edge Reference Architecture to Utilities, Oil & Gas and Other Industrial Markets

Today, Juniper Networks, in collaboration with Schweitzer Engineering Laboratories (SEL Inc.) and Dragos Inc., announced the Converged Industrial Edge; a communications architecture designed to reduce cybersecurity risk, lower operational expense

Share
IcedID Campaign Strikes Back

In our previous blog about IcedID, we  explored some of the changes in the malware and how it tries to evade detection. We also detailed how threat actors took advantage

Share
When an Attack Strikes, Juniper Connected Security Provides Peace of Mind

In cybersecurity, the difference between a small event that requires minor investigation and a massive data breach can simply boil down to how strong the integration is between two of

Share
Security Survey Says: Don’t Wait Until It’s Broken to Fix It

Analyst firm Freeform Dynamics, in association with Juniper Networks and technology news website The Register, has recently released the report, “Network security in the spotlight: Understanding why it can go

Share