Fortinet diligently balances our commitment to the security of our customers and our culture of responsible transparency and commits to sharing information with that goal in mind. While efforts by threat actors to exploit known vulnerabilities are not new, recent Fortinet investigations have discovered a post exploitation technique used by a threat actor. This blog offers analysis of that finding to help our customers make informed decisions.
Do you ride old network software until it's unsupported or dead? Read about the benefits of maintaining up-to-date software and how they far outweigh the landmines of staying on old, unsupported versions.
Discover Kali Purple, a cyber security platform based on NIST Framework, offering advanced threat defense, incident response, and network analysis.