fortinet

Krytyczna podatność w Fortinet FortiOS SSL-VPN (CVE-2022-42475)

Fortinet opublikował informację o krytycznej podatności CVE-2022-42475 pozwalającej na zdalne wykonanie kodu bez uwierzytelniania w module SSL-VPN (sslvpnd) dla FortiOS. Podatność była aktywnie wykorzystywana w atakach jeszcze zanim jej istnienie zostało ujawnione.




fortinet

Fortinet Survey: 70% of Firms Report Employee Security Gaps

As malicious actors use AI to increase the volume and velocity of their attacks, leaders believe these threats will be harder for their employees to spot, according to the Fortinet survey.




fortinet

Fortinet advances Cyber-Physical System security

In this guest blog, Fortinet CMO details the company's efforts to help channel partners secure the operational technology environment as it becomes an increasingly crucial cybersecurity front.




fortinet

131 percent increase in viruses targeted towards remote workers: Fortinet

Cybercriminals are unleashing a surprisingly high volume of new threats in this short period of time to take advantage of inadvertent security gaps as organizations are in a rush to ensure business continuity.




fortinet

Stock Alert: Fortinet Gains 13% On Q1 Results, Outlook

Shares of cyber security solutions provider Fortinet, Inc. (FTNT) are spiking more than 13% Thursday on the back of better than estimated first-quarter results. The company also provided second-quarter earning outlook above the Street view.






fortinet

Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation

A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected.