Archive for Fortinet - page 4

Getting the Board on Board with Cybersecurity

An organization’s board of directors plays a vital role in managing risk. Here are tips and ideas for engaging effectively with board members. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Catching "EC2 Grouper"- no indicators required!

Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Facing Cloud Commitment Gaps? FortiFlex is Your Holiday Stress Reliever

With FortiFlex in place, organizations can right-size their spend and services for securing their cloud and hybrid environments, dynamically deploying and scaling in, out, up, or down as they require. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Botnets Continue to Target Aging D-Link Vulnerabilities

FortiGuard Labs recently noticed that attackers still use and deliver two different botnets via D-Link exposing a HNAP interface weakness. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Analyzing Malicious Intent in Python Code: A Case Study

In this FortiGuard analysis, we examine the Python scripts behind two malicious packages, outline their behaviors, and provide insights into their potential impact. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Fortinet Releases Security Updates for FortiManager

Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber threat actor could exploit this vulnerability to take control of an affected system. Users and administrators are encouraged to review the following Fortinet Security Bulletin and apply the necessary updates: FG-IR-24-425…

Continue reading →

How Public-Private Collaborations Contribute to Cybercrime Disruption

Fortinet is proud to be part of numerous collaborative efforts to disrupt global cybercrime operations. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Don’t Overlook These Key SSE Components

Learn about the key SSE features to consider outside of the well-established basics. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 4 of 21 ← First ... 2 3 4 5 6 ... Last →