❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Bloking Malware Through Antivirus Security Profile in FortiGate

The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access this content. You can register for free. Β  Β  Β  Thank you. The CISO2CISO Advisors Team.

La entrada Bloking Malware Through Antivirus Security Profile in FortiGate se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

China state hackers infected 20,000 Fortinet VPNs, Dutch spy service says

11 June 2024 at 18:56
China state hackers infected 20,000 Fortinet VPNs, Dutch spy service says

Enlarge

Hackers working for the Chinese government gained access to more than 20,000 VPN appliances sold by Fortinet using a critical vulnerability that the company failed to disclose for two weeks after fixing it, Netherlands government officials said.

The vulnerability, tracked as CVE-2022-42475, is a heap-based buffer overflow that allows hackers to remotely execute malicious code. It carries a severity rating of 9.8 out of 10. A maker of network security software, Fortinet silently fixed the vulnerability on November 28, 2022, but failed to mention the threat until December 12 of that year, when the company said it became aware of an β€œinstance where this vulnerability was exploited in the wild.” On January 11, 2023β€”more than six weeks after the vulnerability was fixedβ€”Fortinet warned a threat actor was exploiting it to infect government and government-related organizations with advanced custom-made malware.

Enter CoatHanger

The Netherlands officials first reported in February that Chinese state hackers had exploited CVE-2022-42475 to install an advanced and stealthy backdoor tracked as CoatHanger on Fortigate appliances inside the Dutch Ministry of Defense. Once installed, the never-before-seen malware, specifically designed for the underlying FortiOS operating system, was able to permanently reside on devices even when rebooted or receiving a firmware update. CoatHanger could also escape traditional detection measures, the officials warned. The damage resulting from the breach was limited, however, because infections were contained inside a segment reserved for non-classified uses.

Read 6 remaining paragraphs | Comments

Fortinet Expands Cloud Security Portfolio with Lacework Acquisition

10 June 2024 at 10:55

Fortinet announces plans to acquire Lacework, a late-stage cloud security startup that was once listed as a β€œunicorn” company valued north of $1 billion.

The post Fortinet Expands Cloud Security Portfolio with Lacework Acquisition appeared first on SecurityWeek.

Fortinet to Expand AI, Cloud Security with Lacework Acquisition

10 June 2024 at 11:16
Fortinet Lacework AI cloud security

Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity platform, is bolstering its AI and cloud security capabilities with the planned acquisition of Lacework and its AI-based offerings. The companies announced the proposed deal on Monday, with expectations that it will close in the second half of the year. The plan is..

The post Fortinet to Expand AI, Cloud Security with Lacework Acquisition appeared first on Security Boulevard.

❌
❌