AI-Driven Security Brings Better Visibility and Control to Your Network Edge

With the rise in remote work, employee devices often share networks with personal and new devices are regularly added to networks – and often, unbeknownst to IT. Incomplete network visibility

Share
The Road to SASE is a Journey, Not a Sprint

When it comes to securing an organization, there are so many questions to answer. Where are the organization’s users predominantly located – onsite or remote? Are there any predicted shifts

Share
Introducing Security Director Insights for Network Security Management

In the technology industry, there is no shortage of marketing buzzwords, oftentimes applied to product capabilities that aren’t truly able to live up to their hype. Take “single pane of

Share
Juniper is Recognized as a Challenger in the 2020 Gartner Magic Quadrant for Network Firewalls

Validation is always reassuring, especially when you’ve been told it can’t be done. Stepping off of the beaten path, going against the status quo and doing something different isn’t easy.

Share
Gitpaste-12: a new worming botnet with reverse shell capability spreading via GitHub and Pastebin

Gitpaste-12 is a new worm recently discovered by Juniper Threat Labs, which uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available. There

Share
Juniper’s Attacker IP feed bolsters threat protection with SecIntel

Juniper Threat Labs (JTL) has a network of sensors throughout the world that we use to monitor cyber security threats. These threats can range from Brute Force attacks against logins,

Share
Juniper Strengthens Connected Security Portfolio with New Risk-Based Access Control Capabilities and Remote Access VPN

Do you know who and what is on your network? Throughout my career, whenever I’ve asked this question to IT security leaders, it has almost always been met with an

Share
New pastebin-like service used in multiple malware campaigns

Juniper Threat Labs identified several malware campaigns that rely on a pastebin-like service for its infection chain. The domain in question is paste.nrecom.net. The attacks usually start as a phishing

Share
Priority threat actors  adopt Mirai source code

Mirai has become such a common discovery in the wild that it is beginning to be disregarded as white noise, played off as a simple attack that should be readily

Share
Zeppelin Ransomware returns with a fresh wave of attacks

IT and healthcare providers were targeted in late 2019 by a new ransomware campaign calling itself Zeppelin, a variant of the Buran ransomware-as-a-service family. According to researcher Vitali Kremez, Zeppelin

Share