Home Search
Fortinet - search results
If you're not happy with the results, please do another search
CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
500,000 Fortinet VPN Credentials Leaked on Dark Web Forum
A previously patched Fortinet VPN vulnerability has again been exploited. The threat actor, identified as “Orange,” allegedly exploited the Fortinet CVE-2018-13379 vulnerability and leaked...
Cring Ransomware Targets Unpatched Vulnerabilities in Fortinet VPNs
Security experts from Kaspersky identified a new strain of ransomware exploiting unpatched vulnerabilities in Fortinet VPN devices. Dubbed as Cring, the ransomware is targeting...
Fortinet Fixes Four Critical Vulnerabilities in FortiWeb
Fortinet, a cybersecurity solutions provider, has addressed four critical vulnerabilities in its FortiWeb web application firewalls. Tracked as CVE-2020-29015, CVE-2020-29016, CVE-2020-29019, and CVE-2020-29018, the vulnerabilities were discovered...
CISA Alerts About Path Traversal Vulnerability in Fortinet VPNs
The Cybersecurity and Infrastructure Security Agency (CISA) is warning users about the potential password leaks on Fortinet devices. In an official notification, the agency...
Fortinet Acquires enSilo to Boost Endpoint Security
Network and software security firm Fortinet recently acquired endpoint detection and response firm enSilo to accelerate its security solutions to the edge of corporate...
Symantec and Fortinet partner to deliver comprehensive cloud security service
Cybersecurity company Symantec and integrated and automated cybersecurity solutions Fortinet have announced an expansive partnership agreement to provide customers security solutions. Fortinet’s Next-Generation Firewall...
CISA Adds 15 New Flaws to its Actively Exploited Vulnerabilities Catalog
Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security...
Log4j Explained: How It Is Exploited and How to Fix It
Log4j or Log4Shell, a critical vulnerability in the widely used Apache Log4j Library, has raised alarms and security concerns across the tech and info...
Iranian Threat Actors Leverage PowerShortShell to Exploit Microsoft Flaw
Security experts from SafeBreach Labs identified a new Iranian threat actor group exploiting a Microsoft MSHTML Remote Code Execution (RCE) flaw - CVE-2021-40444. The group reportedly...