Apache Druid is an open source, distributed data store that is designed for ingesting high volumes of data to provide instant data visibility, ad-hoc analytics and queries with low latency and
![Everything but the kitchen sink: more attacks from the Gitpaste-12 worm](https://blogs.juniper.net/wp-content/uploads/2020/12/image8.png)
In November, Juniper Threat Labs documented a new wormable cryptomining campaign dubbed Gitpaste-12. The initial wave of Gitpaste-12 attacks was last seen on October 27, when the GitHub repository hosting
![DarkIRC bot exploits recent Oracle WebLogic vulnerability](https://blogs.juniper.net/wp-content/uploads/2020/11/SEC-200749_DIGITAL_Threat-Labs-blog-image-Oracle.gif)
Juniper Threat Labs is seeing active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully exploited, allows unauthenticated remote code execution. As of this writing, we found
![Gitpaste-12: a new worming botnet with reverse shell capability spreading via GitHub and Pastebin](https://blogs.juniper.net/wp-content/uploads/2020/11/Digital-threat-blog-Gitpaste-12.gif)
Gitpaste-12 is a new worm recently discovered by Juniper Threat Labs, which uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available. There
![Juniper’s Attacker IP feed bolsters threat protection with SecIntel](https://blogs.juniper.net/wp-content/uploads/2020/10/SEC-200640_DIGITAL_Juniper-Threat-Labs-Command-Control-blog.gif)
Juniper Threat Labs (JTL) has a network of sensors throughout the world that we use to monitor cyber security threats. These threats can range from Brute Force attacks against logins,
![New pastebin-like service used in multiple malware campaigns](https://blogs.juniper.net/wp-content/uploads/2020/10/SEC-200652-_DIGITAL_Threat-Labs-Blog-image-for-Pastebin-Malware.gif)
Juniper Threat Labs identified several malware campaigns that rely on a pastebin-like service for its infection chain. The domain in question is paste.nrecom.net. The attacks usually start as a phishing
![Priority threat actors adopt Mirai source code](https://blogs.juniper.net/wp-content/uploads/2020/10/200639_DIGITAL_Juniper-Threat-Labs_Anchor-Image-for-blog.gif)
Mirai has become such a common discovery in the wild that it is beginning to be disregarded as white noise, played off as a simple attack that should be readily
![Zeppelin Ransomware returns with a fresh wave of attacks](https://blogs.juniper.net/wp-content/uploads/2020/09/SEC-200607_DIGITAL_Threat-Labs-Blog-Image.gif)
IT and healthcare providers were targeted in late 2019 by a new ransomware campaign calling itself Zeppelin, a variant of the Buran ransomware-as-a-service family. According to researcher Vitali Kremez, Zeppelin
![The evolving use of Shellshock and Perlbot to target Webmin](https://blogs.juniper.net/wp-content/uploads/2020/08/SEC-200577_DIGITAL_Blog-image-for-Threat-Labs.gif)
Juniper Threat Labs has observed attackers exploiting older versions of Webmin using the Shellshock vulnerability to deploy Perlbot malware.
![IcedID Campaign Strikes Back](https://blogs.juniper.net/wp-content/uploads/2020/08/SEC-200675_DIGITAL_Add-logo-to-Threat-Labs-blog-images.gif)
In our previous blog about IcedID, we explored some of the changes in the malware and how it tries to evade detection. We also detailed how threat actors took advantage