Privacy professionalsfromTheregister2 months agoNew ransomware gang targets Fortinet firewalls, victim dataMora_001 ransomware group exploits Fortinet vulnerabilities to deploy SuperBlack ransomware after intrusions reported since January.
Artificial intelligencefromSecuritymagazine3 weeks agoAI-powered, automated attacks have reached record numbersAI is driving a significant increase in automated cyberattacks, making them faster and more sophisticated.
London startupfromComputerWeekly.com2 months agoSuperBlack ransomware may have ties to LockBit | Computer WeeklyA new ransomware gang, potentially linked to LockBit, is exploiting Fortinet vulnerabilities.
Information securityfromThe Hacker News1 month agoFortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink ExploitFortinet warns that attackers maintain read-only access to vulnerable FortiGate devices by exploiting symlinks, despite patching initial vulnerabilities.
Information securityfromTheregister6 months agoChina-linked group exploits Fortinet 0-dayChinese-linked hackers exploit Fortinet VPN zero-day vulnerability, stealing user credentials and sensitive information.
Privacy professionalsfromTheregister2 months agoNew ransomware gang targets Fortinet firewalls, victim dataMora_001 ransomware group exploits Fortinet vulnerabilities to deploy SuperBlack ransomware after intrusions reported since January.
Artificial intelligencefromSecuritymagazine3 weeks agoAI-powered, automated attacks have reached record numbersAI is driving a significant increase in automated cyberattacks, making them faster and more sophisticated.
London startupfromComputerWeekly.com2 months agoSuperBlack ransomware may have ties to LockBit | Computer WeeklyA new ransomware gang, potentially linked to LockBit, is exploiting Fortinet vulnerabilities.
Information securityfromThe Hacker News1 month agoFortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink ExploitFortinet warns that attackers maintain read-only access to vulnerable FortiGate devices by exploiting symlinks, despite patching initial vulnerabilities.
Information securityfromTheregister6 months agoChina-linked group exploits Fortinet 0-dayChinese-linked hackers exploit Fortinet VPN zero-day vulnerability, stealing user credentials and sensitive information.
Tech industryfromTechzine Global2 months agoAfter SASE and Unified SASE, there's Sovereign SASE: what is that?Sovereign SASE enables organizations to balance cloud convenience with regulatory compliance while maintaining control over sensitive data.