A surge in web probes focusing on units from Juniper Networks, Cisco Programs, and Palo Alto Networks ought to put their admins on alert, say security specialists.
A risk actor is probing the web utilizing default credentials for a Juniper Networks router, prompting a cybersecurity knowledgeable to warn community admins to alter the login combo from the manufacturing unit setting in the event that they haven’t already performed so.
“It’s unhappy [that a major networking company is still using a default username and password in 2025] for large, costly merchandise like this,” Johannes Ullrich, dean of analysis on the SANS Institute, who observed the surge in scans for the username “t128” and password “128tRoutes,” stated in an interview.