Archive for Fortinet - page 28

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-55591 Fortinet FortiOS Authorization Bypass Vulnerability CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability CVE-2025-21334 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability CVE-2025-21335…

Continue reading →

Fortinet Releases Security Updates for Multiple Products

Fortinet released security updates to address vulnerabilities in multiple Fortinet products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following and apply necessary updates: Fortinet Security Updates Source…

Continue reading →

Deep Dive Into a Linux Rootkit Malware

An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

New AI-Focused Modules in Our Security Awareness and Training Service

Leaders know that employees can be a solid first line of defense against cyber incidents if they have the proper knowledge and understand how to spot a potential attack. However, as threat actors increasingly embrace AI to enhance the volume and velocity of their efforts,…

Continue reading →

Phish-free PayPal Phishing

An example of a recent phishing attempt and how to spot the obvious phishing tell-tales. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Getting the Board on Board with Cybersecurity

An organization’s board of directors plays a vital role in managing risk. Here are tips and ideas for engaging effectively with board members. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Catching "EC2 Grouper"- no indicators required!

Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Facing Cloud Commitment Gaps? FortiFlex is Your Holiday Stress Reliever

With FortiFlex in place, organizations can right-size their spend and services for securing their cloud and hybrid environments, dynamically deploying and scaling in, out, up, or down as they require. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 28 of 46 ← First ... 26 27 28 29 30 ... Last →