Archive for Fortinet - page 2

From ClickFix to Command: A Full PowerShell Attack Chain

A regionally targeted PowerShell-based campaign used phishing lures, obfuscation, and RAT delivery to infiltrate Israeli organizations. Learn how the attack chain worked—and how Fortinet blocked it. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Lacework FortiCNAPP Award-Winning Approach Sets New Standard for Cloud Security

FortiCNAPP was named Best Cloud Workload Protection Solution at the 2025 SC Awards. Learn how its latest innovations deliver real-time threat detection, agentless Windows scanning, automated compliance, and unified cloud visibility. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

5 Steps to Building a Unified SASE Architecture

Fortinet helps you build a unified SASE strategy in five simple steps to consolidate tools, enforce identity-based access, and streamline operations at a global scale.) Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Unveiling a New Variant of the DarkCloud Campaign

FortiGuard Labs has uncovered a stealthy new variant of DarkCloud malware that leverages phishing emails, obfuscated JavaScript, PowerShell loaders, and process hollowing to exfiltrate credentials, payment data, and email contacts—all without dropping a file to disk. Source link Author: Fortinet Article used for cyber security…

Continue reading →

Malicious Packages Across Open-Source Registries: Detection Statistics and Trends (Q2 2025)

Malware threats continue to infiltrate open-source software registries. FortiGuard Labs’ Q2 2025 analysis reveals persistent tactics used in malicious NPM and PyPI packages, including credential theft, obfuscation, and install-time payloads. Learn how threat actors exploit OSS and how to stay protected. Source link Author: Fortinet…

Continue reading →

How Feedback Loops and Machine Learning Power High-Precision Intrusion Detection in Lacework FortiCNAPP

Learn how FortiCNAPP uses feedback loops, machine learning, and composite signal scoring to continuously refine intrusion detection. Improve precision, recall, and alert accuracy at cloud scale. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Attending Black Hat? Connect with Fortinet.

Learn about opportunities to connect with our team of experts who will be offering insights, advice, and showcasing our products, services, and threat intelligence solutions. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

In-Depth Analysis of an Obfuscated Web Shell Script

Detailed analysis of an obfuscated web shell used in a CNI attack. Explores its structure, traffic patterns, and Fortinet’s detection and protection. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 2 of 36 1 2 3 4 5 ... Last →