Security Incident Response
Latest Articles
Shadow Brokers release password to second set of files

Shadow Brokers release password to second set of files

Juniper is analyzing new information available regarding Shadow Broker files.

Read more...

Juniper Employee
Shadow Brokers Release of Hacking Code

Shadow Brokers Release of Hacking Code

Juniper responds to hacking code released by The Shadow Brokers.

Read more...

Juniper Employee
HTTP Evader: Automate Firewall and IDS Evasion Tests, Analyse Browser Behavior

HTTP Evader: Automate Firewall and IDS Evasion Tests, Analyse Browser Behavior

Many security systems today rely on Anomaly, Heuristic, Signature, Pattern, Reputation and Rule-Based architectures which need in many cases an understanding of the vulnerability or attack to be identified as malicious in nature...

Read more...

Juniper Employee
Latest Comments
SIRT | 12-20-2015
Re: Important Announcement about ScreenOS®
SIRT | 12-20-2015
Re: Important Announcement about ScreenOS®
SIRT | 12-20-2015
Re: Important Announcement about ScreenOS®
By  spuluka