82 new signatures:MEDIUMHTTP: MAL-REDIRECT Infection-61MEDIUMHTTP: SUSP-HDR-REDRCT Infection-62MEDIUMHTTP: SCRIPT-INJ Infection-63MEDIUMHTTP: MAL-REDIRECT Infection-64MEDIUMHTTP: SUSP-HDR-REDRCT Infection-65MEDIUMHTTP: SCRIPT-INJ Infection-66MEDIUMHTTP: MAL-REDIRECT Infection-67MEDIUMHTTP: SUSP-HDR-REDRCT Infection-68MEDIUMHTTP: SCRIPT-INJ Infection-69MEDIUMHTTP: MAL-REDIRECT Infection-70MEDIUMHTTP: SUSP-HDR-REDRCT Infection-71MEDIUMHTTP: SCRIPT-INJ Infection-72MEDIUMHTTP: MAL-REDIRECT Infection-73MEDIUMHTTP: SUSP-HDR-REDRCT Infection-74MEDIUMHTTP: SCRIPT-INJ Infection-75MEDIUMHTTP: MAL-REDIRECT Infection-76MEDIUMHTTP: SUSP-HDR-REDRCT Infection-77HIGHHTTP: HPE Intelligent Management Center saveSelectedDevices Expression Language InjectionHIGHHTTP: Trend Micro InterScan Messaging Security Remote Code ExecutionHIGHHTTP: Microsoft Windows PDF Library Heap-based Buffer OverflowHIGHAPP: Racer Remote Buffer OverflowMEDIUMHTTP: SCRIPT-INJ Infection-0MEDIUMHTTP: MAL-REDIRECT Infection-1MEDIUMHTTP: SUSP-HDR-REDRCT Infection-2MEDIUMHTTP: SCRIPT-INJ Infection-3MEDIUMHTTP: MAL-REDIRECT Infection-4MEDIUMHTTP: SUSP-HDR-REDRCT Infection-5MEDIUMHTTP: SCRIPT-INJ Infection-6MEDIUMHTTP: MAL-REDIRECT Infection-7MEDIUMHTTP: SUSP-HDR-REDRCT Infection-8MEDIUMHTTP: SCRIPT-INJ Infection-9MEDIUMHTTP: MAL-REDIRECT Infection-10MEDIUMHTTP: SUSP-HDR-REDRCT Infection-11MEDIUMHTTP: SCRIPT-INJ Infection-12MEDIUMHTTP: MAL-REDIRECT Infection-13MEDIUMHTTP: SUSP-HDR-REDRCT Infection-14MEDIUMHTTP: SCRIPT-INJ Infection-15MEDIUMHTTP: MAL-REDIRECT Infection-16MEDIUMHTTP: SUSP-HDR-REDRCT Infection-17MEDIUMHTTP: SCRIPT-INJ Infection-18MEDIUMHTTP: MAL-REDIRECT Infection-19MEDIUMHTTP: SUSP-HDR-REDRCT Infection-20MEDIUMHTTP: SCRIPT-INJ Infection-21MEDIUMHTTP: MAL-REDIRECT Infection-22MEDIUMHTTP: SUSP-HDR-REDRCT Infection-23MEDIUMHTTP: SCRIPT-INJ Infection-24MEDIUMHTTP: MAL-REDIRECT Infection-25MEDIUMHTTP: SUSP-HDR-REDRCT Infection-26MEDIUMHTTP: SCRIPT-INJ Infection-27MEDIUMHTTP: MAL-REDIRECT Infection-28MEDIUMHTTP: SUSP-HDR-REDRCT Infection-29MEDIUMHTTP: SCRIPT-INJ Infection-30MEDIUMHTTP: MAL-REDIRECT Infection-31MEDIUMHTTP: SUSP-HDR-REDRCT Infection-32MEDIUMHTTP: SCRIPT-INJ Infection-33MEDIUMHTTP: MAL-REDIRECT Infection-34MEDIUMHTTP: SUSP-HDR-REDRCT Infection-35MEDIUMHTTP: SCRIPT-INJ Infection-36MEDIUMHTTP: MAL-REDIRECT Infection-37MEDIUMHTTP: SUSP-HDR-REDRCT Infection-38MEDIUMHTTP: SCRIPT-INJ Infection-39MEDIUMHTTP: MAL-REDIRECT Infection-40MEDIUMHTTP: SUSP-HDR-REDRCT Infection-41MEDIUMHTTP: SCRIPT-INJ Infection-42MEDIUMHTTP: MAL-REDIRECT Infection-43MEDIUMHTTP: SUSP-HDR-REDRCT Infection-44MEDIUMHTTP: SCRIPT-INJ Infection-45MEDIUMHTTP: MAL-REDIRECT Infection-46MEDIUMHTTP: SUSP-HDR-REDRCT Infection-47MEDIUMHTTP: SCRIPT-INJ Infection-48MEDIUMHTTP: MAL-REDIRECT Infection-49MEDIUMHTTP: SUSP-HDR-REDRCT Infection-50MEDIUMHTTP: SCRIPT-INJ Infection-51MEDIUMHTTP: MAL-REDIRECT Infection-52MEDIUMHTTP: SUSP-HDR-REDRCT Infection-53MEDIUMHTTP: SCRIPT-INJ Infection-54MEDIUMHTTP: MAL-REDIRECT Infection-55MEDIUMHTTP: SUSP-HDR-REDRCT Infection-56MEDIUMHTTP: SCRIPT-INJ Infection-57MEDIUMHTTP: MAL-REDIRECT Infection-58MEDIUMHTTP: SUSP-HDR-REDRCT Infection-59MEDIUMHTTP: SCRIPT-INJ Infection-60
2 updated signatures.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
hope you’ve enjoyed my previous blog (Part 1 of a mini-series on Blockchain for IoT Security) to get familiarize with the key attributes of blockchain. In this blog, my attempt is to explain what IoT security use cases that blockchain can address, via which attributes.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
If deploying new low-latency services has you on the edge of your seat then attend MEC Congress 2017
This year, MEC Congress will take place at the Hotel Palace Berlin in Berlin, Germany from September 25th-27th and Juniper will be there once again with a big presence as a Silver Sponsor. The show’s theme “Pushing Power to the Network Edge”, is attracting many of the industry’s top edge computing experts – from large enterprises, mobile network operators, web companies, and HW/SW vendors - to spend three exciting days together discussing the development of one of the hottest topics in the networking industry!Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
We would like to take this time to recognize our community members that have been actively participating in J-Net. The following members have moved to the next level in our ranking and reward system by regularly assisting their peers, sharing their knowledge, and providing solutions to technical challenges.
Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
The challenge facing media and broadcast organisations across the world is how to take advantage of new digital platforms, content and technology effectively, to diversify their businesses, compete with new media and create new revenue streams. Coupled with audience demands for the highest quality viewing resolution, the trend towards more and more live event broadcasts, and the need to save time and money on production, media organizations are facing a testing time.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
3 new signatures:HIGHHTTP: Apache OFBiz Admin Authentication BypassHIGHHTTP: HPE Operations Orchestration central-remoting Insecure DeserializationCRITICALHTTP: HPE Intelligent Management Center userSelectPagingContent Expression Language Injection
1 updated signature.
1 renamed signature.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Hello J-Net Community members!
We are pleased to announce that we’re currently underway with refreshing the J-Net Community site design. The new design will be more aligned with the look of our Juniper.net website and responsive to any device. No more separate experience on your mobile!
There are a few navigational changes so we wanted provide a sneak peek to make you aware of the changes prior to launch. Please keep in mind that the screenshots we’ve included are from a "prototype design" so this may not be the final look.
Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
RSVP-TE is a widely-deployed control plane protocol that is used to setup Label Switched Paths and provides a rich feature set for TE - protection, bandwidth admission control, priority and preemption. RSVP-TE Pop&Go LSPs couple the rich feature richness of the RSVP-TE control plane with the simplicity of the Segment Routing MPLS forwarding plane. In this blog, we introduce concepts to manage the forwarding plane state scale, improve system performance and to further decouple RSVP-TE from any limitations of the forwarding plane hardware.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Blockchain, or distributed ledger technology (DLT), has become one of the hottest buzz words in recent years. With the rise of IoT (Internet of Things), many enthusiasts believe that Blockchain will be able to solve the security challenges for IoT. If you search on the web, you can find tons of statements like “Blockchain will revolutionize IoT Security”, “Blockchain can change the future of IoT”, “Blockchain will be ultimate game-changer for IoT security”, “Blockchain is the future of IoT”, etc. So it’s fair to ask, is it just hype? Or real? Why and how?Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
13 new signatures:HIGHSSL: OpenSSL X.509 IPAddressFamily Extension Parsing Out-of-Bounds ReadLOWHTTP: Atlassian FishEye and Crucible mostActiveCommitters Information DisclosureHIGHHTTP: Microsoft Edge PreVisitCatch Uninitialized Memory UseHIGHAPP: Trend Micro Control Manager cmdHandlerTVCSCommander SQL InjectionMEDIUMSMB: Microsoft Windows Search Information DisclosureMEDIUMIKE: strongSwan gmp Plugin Denial of ServiceHIGHHTTP: Microsoft Windows CVE-2017-8682 Elevation of PrivilegesHIGHHTTP: Apache Struts 2 REST Plugin XStreamHandler Insecure DeserializationHIGHHTTP: Apache Struts2 REST Plugin XStreamHandler Insecure DeserializationCRITICALSSL: Alien Valut Command InjectionHIGHPORTMAPPER: Oracle Solaris RPC CVE-2017-3623 Heap Buffer OverflowCRITICALHTTP: Alien Valut Command InjectionCRITICALHTTP: Trend Micro Command Injection In HTTP Variables
6 updated signatures.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Today’s enterprise is complex with digital operations and data located in the cloud, at headquarters and on remote sites. Coupled with business need for always-on working and application reliability and it’s not surprising that teams often struggle under the weight of their work.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Cybercrime is a massive, organized business that generates over $2 trillion a year and higher education institutions are among the many daily targets. Colleges and universities need to think differently about security and consider a new “degree option” – a program in which all of your network components are orchestrated into an end-to-end defense domain.
At Juniper, we call this Software-Defined Secure Network or SDSN. SDSN is a unified cybersecurity platform that transforms every network component into an enforcement point, making them an integral part of the security umbrella. The SDSN platform will equip the campus IT teams with centralized policy and control, raising threat intelligence across the entire infrastructure enabling real time analysis and dynamic enforcement.
- Simplify multivendor security environments, increasing efficiency in the event of a breach.
- Provide tools that deliver meaningful insights so security experts can do their jobs more effectively.
- Rapidly defend your institution from unknown or hard-to-detect malware such as ransomware.
- Deploy efficiency with script-building services for installation, upgrades, configuration, and monitoring.
If it is connected, it can be infected. Nowadays, everything in our colleges and universities are connected. Let us work together to manage the security sprawl with a unified cybersecurity platform that dynamically provides automated enforcement and distributed containment. Powered by automated remediation, real-time intelligence, and machine learning, your connected campus will know when and how to defend your institution’s students, faculty, staff and intellectual properties.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
As NFV gains mainstream production status across carriers and service providers worldwide, important facts about the realities of a software-defined network world are coming to light.
Service levels for network functions—more commonly referred to as “service assurance”—is a concept created in the days when network functions were anything but virtual. These network services were tied to physical devices, and that hardware was “assured” to deliver its assigned “services” at a specified up-time.
In NFV, those now-virtualized network functions—or VNFs—must still meet desired service targets in order for the network to support its assigned applications at expected levels.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Data is bucking the trend that suggests all things eventually become a simple commodity. We’ve all spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.
What do I mean by this?Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
At Juniper we believe these technological developments, combined with changing user expectations, competitive pressures, and new economics, are ushering in a new era – the age of digital cohesion – a future in which applications connect and self-assemble to deliver compelling mega-services that enhance our lives.
There are opportunities for service providers to play a starring role in the era of digital cohesion. Discover what those opportunities are and the network architecture requirements needed to thrive in the new era of mega-services ...Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences
Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating more applications more frequently and many are migrating them between different clouds for business agility. But, the greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new software code every year that will generate 50 times more data volume by 2020. This should give you an idea of the increased threat attack surface in a multi-cloud world.Copyright © 1996-2016 Juniper Networks, Inc. All rights reserved Update preferences