0
Attackers are hunting for tampered Juniper firewalls
An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.To read this article in full or to leave a comment, please click here

Cisco says it's found no back-door breaches. Yet.
IP-optical integration is getting to be a trend.
StackEngine, we hardly knew ye. Oracle now owns some production-ready Docker know-how.
Pivotal gains a bigger European presence while Dell also stands to benefit.
Cisco SVP Soni Jiandani provides an update on Cisco’s SDN vision and strategy with highlights on innovations for its Application Centric Infrastructure.