The Cyber Threat Alliance introduced its Responsible Vulnerability Communication Policy, laying out guidelines for responsibly handling disclosed vulnerabilities in any product or system in a way that optimizes secure outcomes. Fortinet proudly supports CTA’s adoption of this policy as part…
Category: PSIRT Blog
Analysis of Threat Actor Data Posting
This blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our customers better understand the situation and make informed decisions. This article has…
Proactive, Responsible Disclosure Is One Crucial Way Fortinet Strengthens Customer Security
The cybersecurity industry continues to grow and mature. As a part of this process, we must collectively raise the topic of—and discuss the need for—ethical rules for handling the disclosure of vulnerabilities, especially given the many benefits of providing such…
Proactive Responsible Disclosure is One Crucial Way Fortinet Strengthens Customer Security
The cybersecurity industry continues to grow and mature. As a part of this process, we must collectively raise the topic of—and discuss the need for—ethical rules for handling the disclosure of vulnerabilities, especially given the many benefits of providing such…
The Importance of Patching: An Analysis of the Exploitation of N-Day Vulnerabilities
An analysis of the exploitation of resolved N-Day Fortinet vulnerabilities by an unknown actor. This article has been indexed from PSIRT Blog Read the original article: The Importance of Patching: An Analysis of the Exploitation of N-Day Vulnerabilities