This blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our customers better understand the situation and make informed decisions.
Open-source intelligence reveals the server-side code of this pernicious SEO-driven malware – without needing a lawyer afterward