snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

380
aktive brukere

#fortigate

0 innlegg0 deltakere0 innlegg i dag
Anne of Green Cables<p>I had one of my favorite "game of telephone, networking equipment described by non-networking people" moments today:</p><p>May I present to you the 40Client, 40Tokens, 40Gate, etc. 😂</p><p>I very gently let them know that it sounds like "40" but it is all "Forti."</p><p><a href="https://noc.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a><br><a href="https://noc.social/tags/fortigate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fortigate</span></a><br><a href="https://noc.social/tags/fortistuffs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fortistuffs</span></a></p>
:mastodon: decio<p>Si tu gères un firewall <a href="https://infosec.exchange/tags/Fortigate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortigate</span></a> (ou tu connais quelqu’un qui en administre un) avec SSL-VPN activé, prends 2 min pour vérifier s’il est compromis.</p><p>Depuis les attaques massives de 2024, des cybercriminels laissent des liens symboliques planqués dans les fichiers de langue. Résultat : même après patch, ils gardent accès au système.</p><p>👉 Plus de 16 000 appareils compromis dans le monde, dont <strong>208 en Suisse</strong> (source : Shadowserver).</p><p>Fortinet a publié un correctif + une signature AV/IPS pour nettoyer, mais faut mettre à jour.<br>👇 <br><a href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/psirt-blogs/</span><span class="invisible">analysis-of-threat-actor-activity</span></a><br>⬇️ [dans les news] <br><a href="https://www.bleepingcomputer.com/news/security/over-16-000-fortinet-devices-compromised-with-symlink-backdoor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/over-16-000-fortinet-devices-compromised-with-symlink-backdoor/</span></a></p><p>📊<br>⬇️ <a href="https://dashboard.shadowserver.org/statistics/combined/tree/?day=2025-04-11&amp;source=compromised_website&amp;source=compromised_website6&amp;tag=fortinet-compromised%2B&amp;geo=all&amp;data_set=count&amp;scale=log" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dashboard.shadowserver.org/sta</span><span class="invisible">tistics/combined/tree/?day=2025-04-11&amp;source=compromised_website&amp;source=compromised_website6&amp;tag=fortinet-compromised%2B&amp;geo=all&amp;data_set=count&amp;scale=log</span></a></p><p>💡 Et pour rappel : si vous administrez pour une entreprise, institution ou toute entité titulaire d’un AS ou de plages IP définies, vous pouvez recevoir des alertes directes de la fondation <span class="h-card" translate="no"><a href="https://infosec.exchange/@shadowserver" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>shadowserver</span></a></span> si un de vos équipements en frontière est détecté comme compromis.<br>⬇️ <br>Inscription ici : <a href="https://www.shadowserver.org/what-we-do/network-reporting/get-reports/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">shadowserver.org/what-we-do/ne</span><span class="invisible">twork-reporting/get-reports/</span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/Suisse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Suisse</span></a> <a href="https://infosec.exchange/tags/fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fortinet</span></a> <a href="https://infosec.exchange/tags/vulnerable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerable</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Symbolic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Symbolic</span></a> <a href="https://infosec.exchange/tags/Link" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Link</span></a> trick lets attackers bypass <a href="https://infosec.exchange/tags/FortiGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiGate</span></a> patches, <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> warns<br><a href="https://securityaffairs.com/176473/hacking/symbolic-link-trick-lets-attackers-bypass-fortigate-patches-fortinet-warns.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176473/hac</span><span class="invisible">king/symbolic-link-trick-lets-attackers-bypass-fortigate-patches-fortinet-warns.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Quincy<p>Hihi, "<a href="https://chaos.social/tags/FortiGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiGate</span></a>" klingt ja schon wie ein Skandal.</p><p>Ich dachte, so bezeichnet man allgemein die Verwendung von Schlangenöl dieses Herstellers 🤷</p>
Dag<p>Forunderlig nok så er ikke <a href="https://snabelen.no/tags/Russland" class="mention hashtag" rel="tag">#<span>Russland</span></a> og <a href="https://snabelen.no/tags/Iran" class="mention hashtag" rel="tag">#<span>Iran</span></a> rammet av <a href="https://snabelen.no/tags/fortigate" class="mention hashtag" rel="tag">#<span>fortigate</span></a> lekkasjen <a href="https://snabelen.no/tags/sikkerhet" class="mention hashtag" rel="tag">#<span>sikkerhet</span></a> <a href="https://snabelen.no/tags/Norsktut" class="mention hashtag" rel="tag">#<span>Norsktut</span></a> <a href="https://www.digi.no/artikler/analyse-se-angrepskart-15-000-hackede-brannmurer-ujevnt-fordelt/554847?sharing_key=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9%24eyJ1c2VySWQiOiI2MDIxMTIiLCJhcnRpY2xlSWQiOjU1NDg0NywiaWF0IjoxNzM3Mzg5NjczLCJleHAiOjE3Mzc0NzYwNzN9%24nIjk4S71RvR6eV_m--U1mggMlCJ992fIZSCB3cExhPc" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">digi.no/artikler/analyse-se-an</span><span class="invisible">grepskart-15-000-hackede-brannmurer-ujevnt-fordelt/554847?sharing_key=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9%24eyJ1c2VySWQiOiI2MDIxMTIiLCJhcnRpY2xlSWQiOjU1NDg0NywiaWF0IjoxNzM3Mzg5NjczLCJleHAiOjE3Mzc0NzYwNzN9%24nIjk4S71RvR6eV_m--U1mggMlCJ992fIZSCB3cExhPc</span></a></p>