The capabilities of OpenAI’s large language model have astounded, delighted and (at times) horrified those who have tried it. Much ink has been spilled speculating which professions will be replaced
![Uncovering the Dark Side of Email Traffic](https://blogs.juniper.net/wp-content/uploads/2023/03/header_email_analysis-e1678421440164.jpg)
Email is an essential service for companies and individuals. Billions of emails are exchanged daily, and within a portion of those emails lurk malware aimed at compromising your organization’s network
![A Custom Python Backdoor for VMWare ESXi Servers](https://blogs.juniper.net/wp-content/uploads/2022/12/SEC-220694_DIGITAL_Threat-Labs-ESXi-backdoor-anchor_2000x1116-1024x571.png)
In October 2022, Juniper Threat Labs discovered a backdoor implanted on a VMware ESXi virtualization server. Since 2019, unpatched ESXi servers have been targets of ongoing in-the-wild attacks based on
![Asbit: An Emerging Remote Desktop Trojan](https://blogs.juniper.net/wp-content/uploads/2022/08/asbit_anchor_image.png)
Introduction Juniper Threat Labs is currently monitoring an emerging Chinese Remote Desktop Trojan called Asbit. It’s a remote access Trojan being advertised on its developer’s website as a “Fast
![CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability](https://blogs.juniper.net/wp-content/uploads/2022/06/MSDT_Cover-1024x576.png)
A zero-day vulnerability was discovered on Microsoft Windows Support Diagnostic Tool (MSDT). On May 27, a researcher who goes by the twitter handle nao_sec discovered an interesting Microsoft Word document
![Muhstik Gang targets Redis Servers](https://blogs.juniper.net/wp-content/uploads/2022/03/220173_DIGITAL_Juniper-Threat-Labs-blog-image-830x463-v1.2.png)
Juniper Threat Labs has uncovered an attack that targets Redis Servers using a recently disclosed vulnerability, namely CVE-2022-0543. This vulnerability exists in some Redis Debian packages. The attack started on
![Log4j Attack Payloads In The Wild](https://blogs.juniper.net/wp-content/uploads/2021/12/Log4j_payloads.png)
Juniper Threat Labs compiled a list of the payloads from log4j attacks we have seen as of 12/16. Most of the payloads install malware such as Muhstik, Kinsing, Mirai and
![Log4j Vulnerability: Attackers Shift Focus From LDAP to RMI](https://blogs.juniper.net/wp-content/uploads/2021/12/Log4j_rmi.png)
In a previous post, we discussed the Log4j vulnerability CVE-2021-44228 and how the exploit works when the attacker uses a Lightweight Directory Access Protocol (LDAP) service to exploit the vulnerability.
![Apache Log4j Vulnerability CVE-2021-44228 Raises widespread Concerns](https://blogs.juniper.net/wp-content/uploads/2021/12/Log4jAnchorImage.png)
Log4j is a popular logging library used in Java by a large number of applications online. To enhance its functionality from basic log formatting, Log4j added the ability to perform
![Apache HTTP Server CVE-2021-42013 and CVE-2021-41773 Exploited in the Wild](https://blogs.juniper.net/wp-content/uploads/2021/10/210528_DIGITAL_Threat-Labs-blog-image-Apache-HTTP-1038x579-1-1024x570.png)
Juniper Threat Labs has been seeing on-going attacks targeting Apache http servers. On October 4, the Apache Software Foundation disclosed CVE-2021-41773, a path traversal 0- day vulnerability with reports of