Juniper Backdoor

The recently disclosed backdoor in Juniper firewalls also covered extensively here poses a very interesting question. If the code was “unauthorized,” how did it get distributed? Rather than speculating in the post, I would like to present the opportunity for our members and readers to start a discussion.

Please weigh in with comments.

This entry was posted in CyberSecurity. Bookmark the permalink.