Recent network monitoring data from SANS reveals a significant spike in targeted scans seeking to exploit default credentials in Juniper Networks’ Session Smart Router (SSR) platform. Security researchers have observed a massive coordinated campaign attempting to identify and compromise vulnerable devices using factory-set authentication credentials. Scanning Campaign Details SANS reported that from March 23rd to […]
The post Hackers Actively Scanning for Juniper’s Smart Router With Default Password appeared first on Cyber Security News.
This article has been indexed from Cyber Security News