News
Introduction. The history of Juniper Networks (NYSE:JNPR) began in 1996 and almost immediately the company launched the M40 router.Today, Juniper already has an entire platform: switches, security ...
A report from Google Cloud’s Mandiant threat intelligence unit has revealed that the Chinese state-sponsored espionage group UNC3886 successfully compromised Juniper Networks routers running ...
The bug is used by Chinese hackers, who had been exploiting it since 2024 to backdoor vulnerable Juniper routers that reached end-of-life, a recent Madiant security report revealed.
Juniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access. This medium severity flaw (CVE-2025 ...
A China-nexus threat actor with apparent in-depth knowledge of Juniper MX devices has compromised the routers using custom backdoors, according to research released Wednesday by Mandiant. In mid ...
Mandiant worked with Juniper to investigate the activity. How the Attackers Infected Juniper Routers. Mandiant’s investigation revealed that UNC3886 was able to overcome Junos OS’ protection subsystem ...
The threat group UNC3886 uses stolen credentials and custom malware implants to compromise end-of-life routers from Juniper Networks still in use by enterprises and ISPs.
Juniper Networks (NYSE: JNPR), a leader in secure, AI-Native Networking, today announced a new round of innovations for its routing portfolio that exp ...
Attackers can abuse security vulnerabilities in Juniper's Session Smart Router, Session Smart Conductor and WAN Assurance Router. It is possible to take over vulnerable devices. Juniper's Session ...
Juniper Networks says it found a critical flaw during internal testing ; Session Smart routers bug has a 9.8 severity score and allows full device takeover; A patch is already available, so update now ...
Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart Router (SSR) devices. The security flaw (tracked as CVE-2025-21589 ...
The Lumen employees assume that Juniper's enterprise routers are an attractive target, as there are hardly any – if any – host-based monitoring tools in use. The devices are rarely rebooted.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results