Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Falco and Wireshark paved the way for Stratoshark

The origins of Sysdig, Falco, and Wireshark can be traced back to one fundamental need: making sense of complex, real-time network traffic for better security and operational insights. Long before containers and cloud security became pressing concerns, Gerald Combs and Loris Degioanni, creators of Wireshark, were solving a different but related problem: how to capture and analyze packets to understand what was happening across networks.

Inside the Belsen Group Attack: 15000 FortiGate VPN Credentials and Configurations Exposed

It was in January 2025 when a disaster leakage of data was leaked having more than 15,000 configuration files carrying VPN credentials leaked from FortiGate devices spread on several devices. It depicts acute problems inside organizations using the products by Fortinet about a higher need for an excellent security approach. The Belsen Group, the hacking collective carried out this attack by taking advantage of the zero-day vulnerability known as CVE-2022-40684.

The Essential Guide to Web Scraping Proxies: Types, Benefits, and Best Practices

In the digital age, data is a valuable asset, and web scraping has become an essential tool for developers and businesses looking to gather information from the web. However, web scraping can be challenging due to restrictions and blocks imposed by websites. This is where web scraping proxies come into play. In this article, we will explore the essentials of web scraping proxies, their types, benefits, and best practices for using them effectively.

Fortinet Discloses Active Exploitation of Critical Zero-Day Vulnerability: CVE-2024-55591

Note: These vulnerabilities remain under active exploitation and Kroll experts are investigating. If further details are uncovered by our team, updates will be made to the Kroll Cyber Risk blog. A critical authentication bypass vulnerability (CWE-288) affecting FortiOS and FortiProxy (FG-IR-24-535) allows remote attackers to obtain super admin privileges via Node.js WebSocket traffic.

Emerging Threat: Fortinet CVE-2024-55591

On January 14, 2025, Fortinet disclosed a new critical (CVSS 9.6) authentication bypass vulnerability affecting FortiOS and FortiProxy. This vulnerability, CVE-2024-55591, allows unauthenticated remote attackers to target the Node.js WebSocket module of the administrative interface and potentially gain super-admin privileges.

CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day

In late November and December 2024, Arctic Wolf observed evidence of a mass compromise of Fortinet FortiGate. While the initial attack vector was unknown at the time, evidence of compromise (with new users and SSL profiles) was consistent across compromised devices. On January 14, Fortinet released a formal statement and patch. The vulnerability is an Authentication Bypass via crafted requests to Node.js websocket module and issued CVE-2024-55591. The CVSSv3 score is 9.6.

Simplify Network Management with a Single Source of Truth

Managing complex networks can feel like an endless challenge, especially when critical data is scattered across multiple tools and systems. Conflicting sources of truth (SOTs) introduce risks, leaving IT teams uncertain about which data to trust. Without an accurate view of your network, tasks like CVE management, troubleshooting, and compliance become overwhelming—and potentially introduce risk into the network.

Dealing with Modern Cloud Servers for Business: Top Tips to Stay Secure

Modern cloud servers have replaced the need for organizations to own physical servers that take space and time to configure. So instead, they turn to cloud server providers who cater to business requests. By doing so, organizations get increased efficiency and the ability to scale for a fraction of the cost. Cloud servers make collaboration easier for remote teams and even acts as a source of data backup. It's no wonder 94% of enterprises have turned to modern cloud solutions for their servers.

Centralize and conquer: Why multi-site DDI Central is a game changer for managing distributed on-premises networks

Managing distributed IT environments is no easy task. As networks grow increasingly complex and interconnected, centralizing their management becomes a daunting challenge. Traditional tools often fall short, struggling to balance centralized control with the unique configurations and autonomy required at each location. This challenge only amplifies as operations scale, leading to inefficiencies, inconsistencies, and operational silos that hinder productivity.