News

State government IT is often federated, widely dispersed into branch offices and sometimes even integrated with local government programs. A good way to connect branch offices to the increasingly ...
Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was ...
Update 6/12/23 added below: Fortinet released a new advisory warning that the vulnerability may have been exploited in attacks. Fortinet has released new Fortigate firmware updates that fix an ...