Archive for Fortinet - page 9

Fortinet, The Security-Networking Leader (25 Years of Convergence Just Got Bigger)

Read how Fortinet is continuing to expand the limits of security and network convergence into new areas. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Life at Fortinet: Empowering the Next Generation by Bringing Cybersecurity Awareness to Local Schools

In this Life at Fortinet blog series, Ana Castillo, a systems engineer, discusses how Fortinet employees can make an impact at the office and in their local communities. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

The CISA Secure by Design Pledge in Practice: A Year in Review

An overview of some of the actions Fortinet has taken to address CISA’s Secure by Design pledge goals. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Ransomware Roundup – VanHelsing

The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal…

Continue reading →

In the New Era of Cybersecurity, Here’s What’s Driving Long-Term Resilience

Learn more about what approach organizations should take in the face of a new era of cybercrime. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Separating Fact from Fiction: Here’s How AI Is Transforming Cybercrime

This blog post shares key takeaways from a recent RSAC panel discussion, offering defenders a clear assessment of how AI is shifting the cybercrime ecosystem today. Read more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 9 of 36 ← First ... 7 8 9 10 11 ... Last →