Hackers Actively Scanning for Juniper’s Smart Router With Default Password

Recent network monitoring data from SANS reveals a significant spike in targeted scans seeking to exploit default credentials in Juniper Networks’ Session Smart Router (SSR) platform.  Security researchers have observed a massive coordinated campaign attempting to identify and compromise vulnerable devices using factory-set authentication credentials. Scanning Campaign Details SANS reported that from March 23rd to […]

The post Hackers Actively Scanning for Juniper’s Smart Router With Default Password appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: