X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 23/Feb 12:02

Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

Threat actors relying on AI have been exploiting exposed ports and weak credentials to take over FortiGate devices. The post Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Articles similaires

Sorry! Image not available at this time

Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

itsecuritynews.info - 23/Feb 12:02

Threat actors relying on AI have been exploiting exposed ports and weak credentials to take over FortiGate devices. The post Hundreds of FortiGate...

Sorry! Image not available at this time

AWS says more than 600 FortiGate firewalls hit in AI-augmented campaign

itsecuritynews.info - 23/Feb 12:02

Off-the-shelf tools helped Russian-speaking cybercrime group run riot Cybercriminals armed with off-the-shelf generative AI tools compromised more...

Sorry! Image not available at this time

AWS says more than 600 FortiGate firewalls hit in AI-augmented campaign

itsecuritynews.info - 23/Feb 12:02

Off-the-shelf tools helped Russian-speaking cybercrime group run riot Cybercriminals armed with off-the-shelf generative AI tools compromised more...

Sorry! Image not available at this time

Hackers Exploit DeepSeek and Claude AI to Launch Global Attacks on FortiGate Devices

itsecuritynews.info - 24/Feb 05:09

Hackers are using commercial AI models DeepSeek and Claude to automate attacks against FortiGate firewalls worldwide, turning basic misconfigurations...

Sorry! Image not available at this time

Hackers Exploit DeepSeek and Claude AI to Launch Global Attacks on FortiGate Devices

itsecuritynews.info - 24/Feb 05:09

Hackers are using commercial AI models DeepSeek and Claude to automate attacks against FortiGate firewalls worldwide, turning basic misconfigurations...

Sorry! Image not available at this time

This month in security with Tony Anscombe – February 2026 edition

itsecuritynews.info - 06:09

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools...

Sorry! Image not available at this time

This month in security with Tony Anscombe – February 2026 edition

itsecuritynews.info - 06:09

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools...

Sorry! Image not available at this time

Claude Code Flaws Exposed Developer Devices to Silent Hacking

itsecuritynews.info - 26/Feb 14:05

Anthropic has patched vulnerabilities whose impact was demonstrated by Check Point via malicious configuration files. The post Claude Code Flaws...

Sorry! Image not available at this time

Claude Code Flaws Exposed Developer Devices to Silent Hacking

itsecuritynews.info - 26/Feb 14:05

Anthropic has patched vulnerabilities whose impact was demonstrated by Check Point via malicious configuration files. The post Claude Code Flaws...

Sorry! Image not available at this time

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

itsecuritynews.info - 21/Feb 15:07

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI)...