Researcher published a dangerous Windows 10 zero-day exploit

Researcher published a dangerous Windows 10 zero-day exploit

A security researcher today revealed at GitHub the existence of a zero-day vulnerability in Windows 10. Zero-day vulnerabilities are often called ...
Read More

School in Ohio fell victim to attack hacking with Trickbot

On Friday, a school in Ohio discovered he was hacked. In particular, malicious software infected systems and so ...
Read More

AMSA alerts users to phone frauds

AMSA has warned that it has received reports that its phone number has been used to make phishing via telephone ...
Read More
inet infosec

Does industrial robots increase the risk of cyber attacks?

The use of robots in industrial environments has greatly changed the conditions under which the various jobs are being done in the last ...
Read More

Cyber ​​warfare: What is it and which domains it affects?

The term cyber warfare refers to online warfare between governments by performing complex internet attacks. These carriers ...
Read More
Latest Posts

Continue the Juniper Networks research for Shadow Brokers

Η Juniper Networks has already confirmed that some of the exploits and implants leaked data from Shadow Brokers affect its products, more accurately NetScreen firewalls run the ScreenOS operating system.

Juniper Networks
The company did not say in detail what the exploits that affect its products, nor what models or versions of the operating system they are targeting.
But the company said it is still investigating the code and will not release any security advisory until it learns the full extent of the code and what all the contaminated products are.
Derrick Scholl of the juniper Product Security Information Response said (we are quoting his statement):

"As part of our analysis of these files, we identified an attack against NetScreen devices running ScreenOS. We are investigating the extent of the attack, but initial analysis indicates that it targets the boot loader and does not exploit a vulnerability on ScreenOS devices. »

Based on this list (press here to see it), several security researchers claim that the BARGLEE, FEEDTROUGH, and ZESTYLEAK implants are the ones that can be used against Juniper devices.

At the end of last week, Cisco, Fortinet, and WatchGuard have recognized that their products have been affected.
Cisco has already released two security warnings. Fortinet advised its customers to upgrade to the latest version of FortiGuard 5.x while WatchGuard said implants only affected a range of products called RapidStream and that the current modules of the device have been affected.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *