What if your network hardware became a trojan horse for cyber-espionage?
https://thehackernews.com/2025/03/chinese-hackers-breach-juniper-networks.html
This isn’t just a breach—it’s a wake-up call for organizations relying on outdated infrastructure.
Thanks for sharing @akkem.
CISA has added new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.