Do you know who and what is on your network? Throughout my career, whenever I’ve asked this question to IT security leaders, it has almost always been met with an

Juniper Threat Labs identified several malware campaigns that rely on a pastebin-like service for its infection chain. The domain in question is paste.nrecom.net. The attacks usually start as a phishing

Mirai has become such a common discovery in the wild that it is beginning to be disregarded as white noise, played off as a simple attack that should be readily

IT and healthcare providers were targeted in late 2019 by a new ransomware campaign calling itself Zeppelin, a variant of the Buran ransomware-as-a-service family. According to researcher Vitali Kremez, Zeppelin

Today, Juniper Networks, in collaboration with Schweitzer Engineering Laboratories (SEL Inc.) and Dragos Inc., announced the Converged Industrial Edge; a communications architecture designed to reduce cybersecurity risk, lower operational expense

In our previous blog about IcedID, we explored some of the changes in the malware and how it tries to evade detection. We also detailed how threat actors took advantage

In cybersecurity, the difference between a small event that requires minor investigation and a massive data breach can simply boil down to how strong the integration is between two of

Analyst firm Freeform Dynamics, in association with Juniper Networks and technology news website The Register, has recently released the report, “Network security in the spotlight: Understanding why it can go
Juniper Networks is a Champion! Juniper’s Connected Security strategy combines deep network visibility with the ability to enforce security at every connection point throughout the network and this continues to

It’s no secret that 2020 is experiencing explosive growth in employees working from home. Organizations around the world must now extend the security controls typically used to protect a handful