Found 2 bookmarks
Custom sorting
Analysis of Threat Actor Activity
Analysis of Threat Actor Activity
Fortinet diligently balances our commitment to the security of our customers and our culture of responsible transparency and commits to sharing information with that goal in mind. While efforts by threat actors to exploit known vulnerabilities are not new, recent Fortinet investigations have discovered a post exploitation technique used by a threat actor. This blog offers analysis of that finding to help our customers make informed decisions.
·fortinet.com·
Analysis of Threat Actor Activity
New Ransomware Operator Exploits Fortinet Vulnerability Duo
New Ransomware Operator Exploits Fortinet Vulnerability Duo
Between late January and early March, Forescout Research – Vedere Labs identified a series of intrusions based on two Fortinet vulnerabilities. It began with the exploitation of Fortigate firewall appliances — culminating in the deployment of a newly discovered ransomware strain we have dubbed SuperBlack.
·forescout.com·
New Ransomware Operator Exploits Fortinet Vulnerability Duo