A now-patched, high-severity bug in Fortinet's FortiClient VPN application potentially allows a low-privilege rogue user or ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...
Chinese threat actors use a custom post-exploitation toolkit named 'DeepData' to exploit a zero-day vulnerability in Fortinet ...
A design flaw in the Fortinet VPN server's logging mechanism can be leveraged to conceal the successful verification of credentials during a brute-force attack without tipping off defenders of ...
Security vulnerabilities in FortiClient for Windows, FortiAnalyzer and FortiOS make the systems susceptible to attacks.