In this episode of the Juniper Threat Labs attack demo series, we will talk about RocketMQ and examine how threat actors can exploit it and deploy Linux malware. We will also show how Juniper customers can be protected through the attack kill chain.
For more information about Juniper Threat Labs, visit: https://threatlabs.juniper.net/home/#/
For more information about Juniper Threat Labs, visit: https://threatlabs.juniper.net/home/#/
- Category
- Juniper Networks
- Tags
- RocketMQ, RocketMQ exploit, Linux malware
Be the first to comment