COVID-19 and FMLA Campaigns used to install new IcedID banking malware

  Juniper Threat Labs has been monitoring a campaign that pushes a new IcedID banking trojan. This new campaign changes tactics by injecting into msiexec.exe to conceal itself and use

Share
Don’t Wait Until It’s Too Late: Save the Network from Crippling DDoS Attacks

Network connectivity is no longer a desire; it has become a necessity to be productive. Whether working, studying or researching, the network is relied on to get the job done,

Share
Keeping Personal Information Safe on World Password Day and Year-Round

Today is World Password Day and this means that, once again, vendors, bloggers and pundits from around the world will put forth a large volume of conflicting advice. So, just

Share

Organizations around the globe have experienced a sudden and significant increase in staff working from home – and this growth is causing overload in traditionally-configured VPNs. Routing all endpoint traffic

Share
Keeping Your Business Secure with a Remote Workforce

Rapid change requires rapid adaptation and today, IT teams find themselves in the middle of one such event calling for this. Dealing with change is part and parcel of life

Share
IoT botnet exploiting TVT Shenzhen DVRs still lingers

Juniper Threat Labs has been monitoring an IoT botnet that has been active in the wild since October 2, 2019. It exploits a vulnerability in Shenzhen TVT DVR NVMS-9000. The

Share
Key Takeaways from RSAC 2020

As the first major information security event of the year, RSAC sets the tone for the industry and the announcements that will follow for at least the next six months. The

Share
Breadsecurity looking to make some dough off your router

Earlier in February, Juniper Threat Labs started to see a variant of Mirai attacks with an attempt to download a MIPS executable file to SOHO routers. We have seen Huawei

Share
Securing the Network for New Demands

Many security professionals are facing new demands to support expanded remote workforces, online learning, mobile users and rapid deployments across diverse environments. This new paradigm introduces a need for massive

Share
Multicloud Security Takes Another Step Forward

Hybrid cloud computing is now the norm, with multicloud computing experiencing an uptick in adoption, as a result. Cloud security is non-negotiable and we’re on a mission to make it

Share