Bad actors race to exploit Juniper firewall vulnerability
Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday responding to concerns about the compromised Juniper firewalls with his clients.The pattern cyber criminals follow after vendors patch vulnerabilities is to compare the patched code to the unpatched code, figure out what the flawed code was and figure out how to use it to break into the device and the network it protects, Pironti says.To read this article in full or to leave a comment, please click here
The Linux Foundation remains noncommittal on the subject.
AWS IoT goes live; Palo Alto integrates with Mirantis; NEC and Intel partner in NFV.
It was no accident: Unauthorized code got into ScreenOS.
The departure of Rivelo earlier this week is unexpected, but the company is in good hands.
Explore your options, chose the right partners, and become an expert on vCPE deployments with Brocade's Virtual Edge Report webinar Q&A