Tag: fortinet
-
Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls
The security provider published mitigation measures to prevent exploitation First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fortinet-confirms-critical-zero-day/
-
Fortinet Confirms New Zero-Day Exploitation
Fortinet patches critical vulnerabilities, including a zero-day that has been exploited in the wild since at least November 2024. The post Fortinet Confirms New Zero-Day Exploitation appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/fortinet-confirms-new-zero-day-exploitation/
-
Attackers exploiting critical Fortinet zero-day vulnerability
Fortinet disclosed another zero-day vulnerability in its FortiOS and FortiProxy products days after Arctic Wolf detailed a threat campaign targeting the vendor’s devices. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366618095/Attackers-exploiting-critical-Fortinet-zero-day-vulnerability
-
Fortinet confirms zero-day flaw used in attacks against its firewalls
Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the wild since early December in what appears to be an indiscriminate and widespread campaign, according to cybersecurity firm Arctic Wolf.The fix for this zero-day is part…
-
Fortinet FortiGate Firewalls Targeted in Sophisticated Campaign Exploiting Management Interfaces
A new report from Arctic Wolf Labs reveals a concerning campaign targeting publicly exposed management interfaces on Fortinet First seen on securityonline.info Jump to article: securityonline.info/fortinet-fortigate-firewalls-targeted-in-sophisticated-campaign-exploiting-management-interfaces/
-
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
Fortinet patched a zero day authentication bypass vulnerability in FortiOS and FortiProxy that has been actively exploited in the wild as a zero-day since November 2024. Background On January 14, Fortinet released a security advisory (FG-IR-24-535) addressing a critical severity vulnerability impacting FortiOS and FortiProxy. CVE Description CVSSv3 CVE-2024-55591 FortiOS and FortiProxy Authentication Bypass Vulnerability…
-
Hackers are exploiting a new Fortinet firewall bug to breach company networks
Security researchers say “tens” of Fortinet devices have been compromised so far as part of the weeks-long hacking campaign. First seen on techcrunch.com Jump to article: techcrunch.com/2025/01/14/hackers-are-exploiting-a-new-fortinet-firewall-bug-to-breach-company-networks/
-
Fortinet Confirms Exploitation Of ‘Critical’ Vulnerability In FortiOS, FortiProxy
Fortinet confirmed exploitation of a critical-severity vulnerability affecting FortiGate firewalls after Arctic Wolf researchers said that ‘mass exploitation’ of the vulnerability is ‘likely.’ First seen on crn.com Jump to article: www.crn.com/news/security/2025/fortinet-confirms-exploitation-of-critical-vulnerability-in-fortios-fortiproxy
-
Zero-Day Likely Cause of Campaign Against Fortinet Firewalls
First seen on scworld.com Jump to article: www.scworld.com/brief/zero-day-likely-cause-of-campaign-against-fortinet-firewalls
-
Widespread Fortinet firewall exploitation likely due to zero-day
First seen on scworld.com Jump to article: www.scworld.com/brief/widespread-fortinet-firewall-exploitation-likely-due-to-zero-day
-
Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
Fortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that’s being exploited by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/14/fortinet-fortigate-zero-day-vulnerability-exploited-cve-2024-55591/
-
Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used
Ransomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg First seen on theregister.com Jump to article: www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/
-
PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts
Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts. The post PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/
-
Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal
A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet’s CISO is calling a “phish-free” phishing campaign. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/fortinet-ciso-details-phish-free-phishing-scheme-using-paypal/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim. First seen on hackread.com Jump to article: hackread.com/paypal-phishing-scam-exploits-ms365-genuine-emails/
-
More telecom firms were breached by Chinese hackers than previously reported
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
Disrupting cybercrime: InFocus with Fortinet’s Derek Manky
First seen on scworld.com Jump to article: www.scworld.com/resource/disrupting-cybercrime-infocus-with-fortinets-derek-manky
-
Infosec products of the month: December 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, Cato Networks, Datadog, Fortinet, GitGuardian, Horizon3.ai, Netwrix, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/27/infosec-products-of-the-month-december-2024/
-
Beware of New Malicious PyPI packages That Steals Login Details
Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet’s AI-driven OSS malware detection system. These packages, spotted on November 16 and November 24, 2024, respectively, represent significant threats to users by leveraging advanced malware techniques. These findings underscore the critical importance of robust cybersecurity measures to protect against such sophisticated threats. Malicious…
-
Intrusions exploiting critical Fortinet EMS bug ongoing
First seen on scworld.com Jump to article: www.scworld.com/brief/intrusions-exploiting-critical-fortinet-ems-bug-ongoing
-
Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data
Fortinet discovers two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, designed to steal data, capture keystrokes, and gain system control. Learn about their malicious behavior and how to protect yourself First seen on hackread.com Jump to article: hackread.com/python-malware-zebo-cometlogger-stealing-user-data/
-
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
Cybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs.The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down. First…

