URL has been copied successfully!
Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords

Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper’s Session Smart Networking Platform (SSR). According to SANS tech reports, Attackers are focusing their efforts on exploiting devices using the default credentials, >>t128<< as the username and >>128tRoutes<< as the password, which are remnants from Juniper's acquisition of 128 Technologies. The surge in [...] The post Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First seen on gbhackers.com Jump to article: gbhackers.com/hackers-actively-scanning-for-juniper-smart-routers/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link