Tag: fortinet
-
Fortinet confirms zero-day flaw used in attacks against its firewalls
by
in SecurityNewsFortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the wild since early December in what appears to be an indiscriminate and widespread campaign, according to cybersecurity firm Arctic Wolf.The fix for this zero-day is part…
-
Fortinet FortiGate Firewalls Targeted in Sophisticated Campaign Exploiting Management Interfaces
by
in SecurityNewsA new report from Arctic Wolf Labs reveals a concerning campaign targeting publicly exposed management interfaces on Fortinet First seen on securityonline.info Jump to article: securityonline.info/fortinet-fortigate-firewalls-targeted-in-sophisticated-campaign-exploiting-management-interfaces/
-
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
by
in SecurityNewsFortinet patched a zero day authentication bypass vulnerability in FortiOS and FortiProxy that has been actively exploited in the wild as a zero-day since November 2024. Background On January 14, Fortinet released a security advisory (FG-IR-24-535) addressing a critical severity vulnerability impacting FortiOS and FortiProxy. CVE Description CVSSv3 CVE-2024-55591 FortiOS and FortiProxy Authentication Bypass Vulnerability…
-
Hackers are exploiting a new Fortinet firewall bug to breach company networks
Security researchers say “tens” of Fortinet devices have been compromised so far as part of the weeks-long hacking campaign. First seen on techcrunch.com Jump to article: techcrunch.com/2025/01/14/hackers-are-exploiting-a-new-fortinet-firewall-bug-to-breach-company-networks/
-
Fortinet Confirms Exploitation Of ‘Critical’ Vulnerability In FortiOS, FortiProxy
by
in SecurityNewsFortinet confirmed exploitation of a critical-severity vulnerability affecting FortiGate firewalls after Arctic Wolf researchers said that ‘mass exploitation’ of the vulnerability is ‘likely.’ First seen on crn.com Jump to article: www.crn.com/news/security/2025/fortinet-confirms-exploitation-of-critical-vulnerability-in-fortios-fortiproxy
-
Zero-Day Likely Cause of Campaign Against Fortinet Firewalls
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/zero-day-likely-cause-of-campaign-against-fortinet-firewalls
-
Widespread Fortinet firewall exploitation likely due to zero-day
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/widespread-fortinet-firewall-exploitation-likely-due-to-zero-day
-
Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
by
in SecurityNewsFortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that’s being exploited by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/14/fortinet-fortigate-zero-day-vulnerability-exploited-cve-2024-55591/
-
Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used
by
in SecurityNewsRansomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg First seen on theregister.com Jump to article: www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/
-
PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts
by
in SecurityNewsFortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts. The post PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/
-
Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal
A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet’s CISO is calling a “phish-free” phishing campaign. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/fortinet-ciso-details-phish-free-phishing-scheme-using-paypal/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
by
in SecurityNews
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim. First seen on hackread.com Jump to article: hackread.com/paypal-phishing-scam-exploits-ms365-genuine-emails/
-
More telecom firms were breached by Chinese hackers than previously reported
by
in SecurityNews
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
Disrupting cybercrime: InFocus with Fortinet’s Derek Manky
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/resource/disrupting-cybercrime-infocus-with-fortinets-derek-manky
-
Infosec products of the month: December 2024
by
in SecurityNewsHere’s a look at the most interesting products from the past month, featuring releases from: Appdome, Cato Networks, Datadog, Fortinet, GitGuardian, Horizon3.ai, Netwrix, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/27/infosec-products-of-the-month-december-2024/
-
Beware of New Malicious PyPI packages That Steals Login Details
by
in SecurityNewsTwo malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet’s AI-driven OSS malware detection system. These packages, spotted on November 16 and November 24, 2024, respectively, represent significant threats to users by leveraging advanced malware techniques. These findings underscore the critical importance of robust cybersecurity measures to protect against such sophisticated threats. Malicious…
-
Intrusions exploiting critical Fortinet EMS bug ongoing
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/intrusions-exploiting-critical-fortinet-ems-bug-ongoing
-
Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data
by
in SecurityNewsFortinet discovers two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, designed to steal data, capture keystrokes, and gain system control. Learn about their malicious behavior and how to protect yourself First seen on hackread.com Jump to article: hackread.com/python-malware-zebo-cometlogger-stealing-user-data/
-
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
by
in SecurityNewsCybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs.The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down. First…
-
Critical Fortinet FortiWLM flaw addressed
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/critical-fortinet-fortiwlm-flaw-addressed
-
Fortinet Wireless Manager: Informationen zu kritischer Lücke zurückgehalten
by
in SecurityNews
Tags: fortinetAngreifer konnten Fortinet Wireless Manager attackieren und Admins-Sessions kapern. Das Netzwerkmanagementool war über mehrere Monate verwundbar. First seen on heise.de Jump to article: www.heise.de/news/Fortinet-Wireless-Manager-Informationen-zu-kritischer-Luecke-zurueckgehalten-10217204.html
-
Fortinet Addresses Unpatched Critical RCE Vector
by
in SecurityNewsFortinet has patched CVE-2023-34990 in its Wireless LAN Manager (FortiWLM), which combined with CVE-2023-48782 could allow for unauthenticated remote code execution (RCE) and the ability to read all log files. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fortinet-addresses-unpatched-critical-rce-vector