Streamline security response at scale with AWS Security Hub automation
A new version of AWS Security Hub, is now generally available, introducing new ways for organizations to manage and respond to security findings. The...
Authenticated SQL injection in API endpoint
CVSSv3 Score: 6.8
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in FortiClientEMS may...
Arbitrary file deletion in administrative interface
CVSSv3 Score: 5.7
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in FortiVoice may allow a...
Unauthenticated remote command injection
CVSSv3 Score: 9.4
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in FortiSIEM...
Heap-based buffer overflow in cw_acd daemon
CVSSv3 Score: 7.4
A heap-based buffer overflow vulnerability in FortiOS and FortiSwitchManager cw_acd daemon may allow a remote unauthenticated attacker...
Unauthenticated access to local configuration
CVSSv3 Score: 9.3
An exposure of sensitive information to an unauthorized actor vulnerability in FortiFone Web Portal page may allow...
SSRF in GUI console
CVSSv3 Score: 3.4
A Server-Side Request Forgery (SSRF) vulnerability in FortiSandbox may allow an authenticated attacker to proxy internal requests...
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
Key takeaways
VoidLink is an advanced malware framework made up of custom loaders, implants, rootkits, and modular plugins designed to maintain long-term access to...






