Chinese threat actors use a custom post-exploitation toolkit named 'DeepData' to exploit a zero-day vulnerability in Fortinet ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...
A now-patched, high-severity bug in Fortinet's FortiClient VPN application potentially allows a low-privilege rogue user or ...
Security vulnerabilities in FortiClient for Windows, FortiAnalyzer and FortiOS make the systems susceptible to attacks.
A design flaw in the Fortinet VPN server's logging mechanism can be leveraged to conceal the successful verification of credentials during a brute-force attack without tipping off defenders of ...