Juniper signatures

Subscribe to Juniper signatures hírcsatorna Juniper signatures
Juniper RSS Feed
Frissítve: 23 perc 1 másodperc
2017. szeptember 21.

Signature Update #2991

Signature Update #2991

82 new signatures:

MEDIUMHTTP: MAL-REDIRECT Infection-61MEDIUMHTTP: SUSP-HDR-REDRCT Infection-62MEDIUMHTTP: SCRIPT-INJ Infection-63MEDIUMHTTP: MAL-REDIRECT Infection-64MEDIUMHTTP: SUSP-HDR-REDRCT Infection-65MEDIUMHTTP: SCRIPT-INJ Infection-66MEDIUMHTTP: MAL-REDIRECT Infection-67MEDIUMHTTP: SUSP-HDR-REDRCT Infection-68MEDIUMHTTP: SCRIPT-INJ Infection-69MEDIUMHTTP: MAL-REDIRECT Infection-70MEDIUMHTTP: SUSP-HDR-REDRCT Infection-71MEDIUMHTTP: SCRIPT-INJ Infection-72MEDIUMHTTP: MAL-REDIRECT Infection-73MEDIUMHTTP: SUSP-HDR-REDRCT Infection-74MEDIUMHTTP: SCRIPT-INJ Infection-75MEDIUMHTTP: MAL-REDIRECT Infection-76MEDIUMHTTP: SUSP-HDR-REDRCT Infection-77HIGHHTTP: HPE Intelligent Management Center saveSelectedDevices Expression Language InjectionHIGHHTTP: Trend Micro InterScan Messaging Security Remote Code ExecutionHIGHHTTP: Microsoft Windows PDF Library Heap-based Buffer OverflowHIGHAPP: Racer Remote Buffer OverflowMEDIUMHTTP: SCRIPT-INJ Infection-0MEDIUMHTTP: MAL-REDIRECT Infection-1MEDIUMHTTP: SUSP-HDR-REDRCT Infection-2MEDIUMHTTP: SCRIPT-INJ Infection-3MEDIUMHTTP: MAL-REDIRECT Infection-4MEDIUMHTTP: SUSP-HDR-REDRCT Infection-5MEDIUMHTTP: SCRIPT-INJ Infection-6MEDIUMHTTP: MAL-REDIRECT Infection-7MEDIUMHTTP: SUSP-HDR-REDRCT Infection-8MEDIUMHTTP: SCRIPT-INJ Infection-9MEDIUMHTTP: MAL-REDIRECT Infection-10MEDIUMHTTP: SUSP-HDR-REDRCT Infection-11MEDIUMHTTP: SCRIPT-INJ Infection-12MEDIUMHTTP: MAL-REDIRECT Infection-13MEDIUMHTTP: SUSP-HDR-REDRCT Infection-14MEDIUMHTTP: SCRIPT-INJ Infection-15MEDIUMHTTP: MAL-REDIRECT Infection-16MEDIUMHTTP: SUSP-HDR-REDRCT Infection-17MEDIUMHTTP: SCRIPT-INJ Infection-18MEDIUMHTTP: MAL-REDIRECT Infection-19MEDIUMHTTP: SUSP-HDR-REDRCT Infection-20MEDIUMHTTP: SCRIPT-INJ Infection-21MEDIUMHTTP: MAL-REDIRECT Infection-22MEDIUMHTTP: SUSP-HDR-REDRCT Infection-23MEDIUMHTTP: SCRIPT-INJ Infection-24MEDIUMHTTP: MAL-REDIRECT Infection-25MEDIUMHTTP: SUSP-HDR-REDRCT Infection-26MEDIUMHTTP: SCRIPT-INJ Infection-27MEDIUMHTTP: MAL-REDIRECT Infection-28MEDIUMHTTP: SUSP-HDR-REDRCT Infection-29MEDIUMHTTP: SCRIPT-INJ Infection-30MEDIUMHTTP: MAL-REDIRECT Infection-31MEDIUMHTTP: SUSP-HDR-REDRCT Infection-32MEDIUMHTTP: SCRIPT-INJ Infection-33MEDIUMHTTP: MAL-REDIRECT Infection-34MEDIUMHTTP: SUSP-HDR-REDRCT Infection-35MEDIUMHTTP: SCRIPT-INJ Infection-36MEDIUMHTTP: MAL-REDIRECT Infection-37MEDIUMHTTP: SUSP-HDR-REDRCT Infection-38MEDIUMHTTP: SCRIPT-INJ Infection-39MEDIUMHTTP: MAL-REDIRECT Infection-40MEDIUMHTTP: SUSP-HDR-REDRCT Infection-41MEDIUMHTTP: SCRIPT-INJ Infection-42MEDIUMHTTP: MAL-REDIRECT Infection-43MEDIUMHTTP: SUSP-HDR-REDRCT Infection-44MEDIUMHTTP: SCRIPT-INJ Infection-45MEDIUMHTTP: MAL-REDIRECT Infection-46MEDIUMHTTP: SUSP-HDR-REDRCT Infection-47MEDIUMHTTP: SCRIPT-INJ Infection-48MEDIUMHTTP: MAL-REDIRECT Infection-49MEDIUMHTTP: SUSP-HDR-REDRCT Infection-50MEDIUMHTTP: SCRIPT-INJ Infection-51MEDIUMHTTP: MAL-REDIRECT Infection-52MEDIUMHTTP: SUSP-HDR-REDRCT Infection-53MEDIUMHTTP: SCRIPT-INJ Infection-54MEDIUMHTTP: MAL-REDIRECT Infection-55MEDIUMHTTP: SUSP-HDR-REDRCT Infection-56MEDIUMHTTP: SCRIPT-INJ Infection-57MEDIUMHTTP: MAL-REDIRECT Infection-58MEDIUMHTTP: SUSP-HDR-REDRCT Infection-59MEDIUMHTTP: SCRIPT-INJ Infection-60

2 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 21.

(Part 2 of 3)Will Blockchain Be the Game Changer for Solving IoT Security Challenges? Why and How?

(Part 2 of 3)Will Blockchain Be the Game Changer for Solving IoT Security Challenges? Why and How?

 hope you’ve enjoyed my previous blog (Part 1 of a mini-series on Blockchain for IoT Security) to get familiarize with the key attributes of blockchain. In this blog, my attempt is to explain what IoT security use cases that blockchain can address, via which attributes.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 20.

Signature Update #2990

Signature Update #2990

1 updated signature.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 18.

If deploying new low-latency services has you on the edge of your seat then attend MEC Congress 2017

If deploying new low-latency services has you on the edge of your seat then attend MEC Congress 2017

 This year, MEC Congress will take place at the Hotel Palace Berlin in Berlin, Germany from September 25th-27th and Juniper will be there once again with a big presence as a Silver Sponsor. The show’s theme “Pushing Power to the Network Edge”, is attracting many of the industry’s top edge computing experts – from large enterprises, mobile network operators, web companies, and HW/SW vendors - to spend three exciting days together discussing the development of one of the hottest topics in the networking industry!

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 18.

Congratulations to J-Net Members!

Congratulations to J-Net Members!

We would like to take this time to recognize our community members that have been actively participating in J-Net. The following members have moved to the next level in our ranking and reward system by regularly assisting their peers, sharing their knowledge, and providing solutions to technical challenges.

 

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 15.

Evolve or fade away: How Broadcast & Media Production is Embracing Digital Transformation

Evolve or fade away: How Broadcast & Media Production is Embracing Digital Transformation

The challenge facing media and broadcast organisations across the world is how to take advantage of new digital platforms, content and technology effectively, to diversify their businesses, compete with new media and create new revenue streams. Coupled with audience demands for the highest quality viewing resolution, the trend towards more and more live event broadcasts, and the need to save time and money on production, media organizations are facing a testing time.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 15.

Signature Update #2989

Signature Update #2989

3 new signatures:

HIGHHTTP: Apache OFBiz Admin Authentication BypassHIGHHTTP: HPE Operations Orchestration central-remoting Insecure DeserializationCRITICALHTTP: HPE Intelligent Management Center userSelectPagingContent Expression Language Injection

1 updated signature.

1 renamed signature.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 14.

New look for your J-Net Community!

New look for your J-Net Community!

Hello J-Net Community members!

 

We are pleased to announce that we’re currently underway with refreshing the J-Net Community site design. The new design will be more aligned with the look of our Juniper.net website and responsive to any device. No more separate experience on your mobile!

 

There are a few navigational changes so we wanted provide a sneak peek to make you aware of the changes prior to launch. Please keep in mind that the screenshots we’ve included are from a "prototype design" so this may not be the final look.

 

 

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 14.

RSVP-TE Pop&Go: Using a shared MPLS forwarding plane

RSVP-TE Pop&Go: Using a shared MPLS forwarding plane

RSVP-TE is a widely-deployed control plane protocol that is used to setup Label Switched Paths and provides a rich feature set for TE - protection, bandwidth admission control, priority and preemption. RSVP-TE Pop&Go LSPs couple the rich feature richness of the RSVP-TE control plane with the simplicity of the Segment Routing MPLS forwarding plane. In this blog, we introduce concepts to manage the forwarding plane state scale, improve system performance and to further decouple RSVP-TE from any limitations of the forwarding plane hardware. 

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 13.

Will Blockchain Be the Game Changer for Solving IoT Security Challenges? Why and How? (1/3)

Will Blockchain Be the Game Changer for Solving IoT Security Challenges? Why and How? (1/3)

Blockchain, or distributed ledger technology (DLT), has become one of the hottest buzz words in recent years. With the rise of IoT (Internet of Things), many enthusiasts believe that Blockchain will be able to solve the security challenges for IoT. If you search on the web, you can find tons of statements like “Blockchain will revolutionize IoT Security”, “Blockchain can change the future of IoT”, “Blockchain will be ultimate game-changer for IoT security”, “Blockchain is the future of IoT”, etc. So it’s fair to ask, is it just hype? Or real? Why and how?

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 12.

Signature Update #2988

Signature Update #2988

13 new signatures:

HIGHSSL: OpenSSL X.509 IPAddressFamily Extension Parsing Out-of-Bounds ReadLOWHTTP: Atlassian FishEye and Crucible mostActiveCommitters Information DisclosureHIGHHTTP: Microsoft Edge PreVisitCatch Uninitialized Memory UseHIGHAPP: Trend Micro Control Manager cmdHandlerTVCSCommander SQL InjectionMEDIUMSMB: Microsoft Windows Search Information DisclosureMEDIUMIKE: strongSwan gmp Plugin Denial of ServiceHIGHHTTP: Microsoft Windows CVE-2017-8682 Elevation of PrivilegesHIGHHTTP: Apache Struts 2 REST Plugin XStreamHandler Insecure DeserializationHIGHHTTP: Apache Struts2 REST Plugin XStreamHandler Insecure DeserializationCRITICALSSL: Alien Valut Command InjectionHIGHPORTMAPPER: Oracle Solaris RPC CVE-2017-3623 Heap Buffer OverflowCRITICALHTTP: Alien Valut Command InjectionCRITICALHTTP: Trend Micro Command Injection In HTTP Variables

6 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 11.

Securing the Distributed Enterprise

Securing the Distributed Enterprise

 

 

 

 

Today’s enterprise is complex with digital operations and data located in the cloud, at headquarters and on remote sites. Coupled with business need for always-on working and application reliability and it’s not surprising that teams often struggle under the weight of their work.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 8.

The Connected Campus: Securing Higher Education by Tom Boehmer (part 2)

The Connected Campus: Securing Higher Education by Tom Boehmer (part 2)

Since cybersecurity has been the #1 issue on the Educause Top 10 IT issues list for last two years, I thought I would highlight how we can secure the Connected Campus

 

Cybercrime is a massive, organized business that generates over $2 trillion a year and higher education institutions are among the many daily targets.  Colleges and universities need to think differently about security and consider a new “degree option” – a program in which all of your network components are orchestrated into an end-to-end defense domain. 

 

At Juniper, we call this Software-Defined Secure Network or SDSN.  SDSN is a unified cybersecurity platform that transforms every network component into an enforcement point, making them an integral part of the security umbrella.  The SDSN platform will equip the campus IT teams with centralized policy and control, raising threat intelligence across the entire infrastructure enabling real time analysis and dynamic enforcement.

 

The Connected Campus built on SDSN will:

  • Simplify multivendor security environments, increasing efficiency in the event of a breach.
  • Provide tools that deliver meaningful insights so security experts can do their jobs more effectively.
  • Rapidly defend your institution from unknown or hard-to-detect malware such as ransomware.
  • Deploy efficiency with script-building services for installation, upgrades, configuration, and monitoring.

                                                                                  Figure 1 SDSN Building Blocks

 

If it is connected, it can be infected.  Nowadays, everything in our colleges and universities are connected. Let us work together to manage the security sprawl with a unified cybersecurity platform that dynamically provides automated enforcement and distributed containment.  Powered by automated remediation, real-time intelligence, and machine learning, your connected campus will know when and how to defend your institution’s students, faculty, staff and intellectual properties.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 8.

Signature Update #2987

Signature Update #2987

1 new signature:

MEDIUMHTTP: Apache Sling Framework Information Disclosure

5 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 7.

As NFV Displaces Dedicated Network Functions, Who is Managing Service Levels?

As NFV Displaces Dedicated Network Functions, Who is Managing Service Levels?

As NFV gains mainstream production status across carriers and service providers worldwide, important facts about the realities of a software-defined network world are coming to light.

 

Service levels for network functions—more commonly referred to as “service assurance”—is a concept created in the days when network functions were anything but virtual. These network services were tied to physical devices, and that hardware was “assured” to deliver its assigned “services” at a specified up-time.

 

In NFV, those now-virtualized network functions—or VNFs—must still meet desired service targets in order for the network to support its assigned applications at expected levels.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 7.

Security and the de-commoditisation of data

Security and the de-commoditisation of data

Data is bucking the trend that suggests all things eventually become a simple commodity. We’ve all spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

 

What do I mean by this?

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 6.

Service providers: Stars or supporting actors in the age of digital cohesion

Service providers: Stars or supporting actors in the age of digital cohesion

At Juniper we believe these technological developments, combined with changing user expectations, competitive pressures, and new economics, are ushering in a new era – the age of digital cohesion – a future in which applications connect and self-assemble to deliver compelling mega-services that enhance our lives.

 

There are opportunities for service providers to play a starring role in the era of digital cohesion. Discover what those opportunities are and the network architecture requirements needed to thrive in the new era of mega-services ...

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 5.

Blockchain for Network Operators

Blockchain for Network Operators

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 5.

Signature Update #2986

Signature Update #2986

2 new signatures:

MEDIUMAPP: Trend Micro Control Manager SQL InjectionHIGHSMB: Microsoft Windows Search Heap Buffer Overflow

3 updated signatures.

1 renamed signature.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2017. szeptember 5.

Dynamically Securing Applications in a Multi-Cloud World

Dynamically Securing Applications in a Multi-Cloud World

Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating more applications more frequently and many are migrating them between different clouds for business agility. But, the greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new software code every year that will generate 50 times more data volume by 2020. This should give you an idea of the increased threat attack surface in a multi-cloud world. 

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences