HomeVulnerabilitySurge in risk actors scanning Juniper, Cisco, and Palo Alto Networks units

Surge in risk actors scanning Juniper, Cisco, and Palo Alto Networks units

A surge in web probes focusing on units from Juniper Networks, Cisco Programs, and Palo Alto Networks ought to put their admins on alert, say security specialists.

A risk actor is probing the web utilizing default credentials for a Juniper Networks router, prompting a cybersecurity knowledgeable to warn community admins to alter the login combo from the manufacturing unit setting in the event that they haven’t already performed so.

“It’s unhappy [that a major networking company is still using a default username and password in 2025] for large, costly merchandise like this,” Johannes Ullrich, dean of analysis on the SANS Institute, who observed the surge in scans for the username “t128” and password “128tRoutes,” stated in an interview.

See also  Google Rushes to Patch New Zero-Day Exploited by Spyware and adware Vendor
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular