Fortinet FortiGate devices face automated attacks creating rogue accounts

Automated attacks are targeting Fortinet FortiGate devices, creating unauthorized accounts and stealing firewall data. A recent patch from Fortinet may not be as effective as anticipated. The issue was reported on January 23, 2026.

Fortinet FortiGate devices, widely used in network security, are under attack through automated methods that generate rogue accounts and extract sensitive firewall data. According to a TechRadar report published on January 23, 2026, these incidents highlight ongoing vulnerabilities in the devices.

The attacks exploit weaknesses that persist despite a recent Fortinet patch, which appears to fall short in fully addressing the threats. Security experts note that such automated campaigns can rapidly compromise multiple systems, potentially leading to broader network breaches.

Fortinet has not issued further details on the patch's limitations in the available information, but the report underscores the need for users to monitor their devices closely and apply any updates promptly. This development raises concerns about the effectiveness of current cybersecurity measures against evolving automated threats.

Related Articles

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Image generated by AI

Researchers discover SSHStalker botnet infecting Linux servers

Reported by AI Image generated by AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Security experts are warning that ransomware attacks are now more frequently targeting firewalls. They advise organizations to secure these critical network defenses promptly. The alert comes amid rising cyber threats.

Reported by AI

WatchGuard has addressed a critical remote code execution vulnerability in its Firebox OS firewall software. The company urges users to update immediately to mitigate the risk. The flaw was identified by the firewall maker itself.

Veeam has addressed three critical-severity security vulnerabilities that could expose backup servers to remote code execution attacks. The company issued patches to mitigate these risks. The announcement highlights ongoing concerns in cybersecurity for data protection tools.

Reported by AI

In 2025, cyber threats in the Philippines stuck to traditional methods like phishing and ransomware, without new forms emerging. However, artificial intelligence amplified the volume and scale of these attacks, leading to an 'industrialization of cybercrime'. Reports from various cybersecurity firms highlight increases in speed, scale, and frequency of incidents.

Zyxel has issued a warning about a critical remote code execution (RCE) security flaw that could affect more than a dozen of its routers. The company has addressed a handful of concerning vulnerabilities in its devices. This update comes as part of ongoing efforts to secure networking equipment.

Reported by AI

IBM's artificial intelligence tool, known as Bob, has been found susceptible to manipulation that could lead to downloading and executing malware. Researchers highlight its vulnerability to indirect prompt injection attacks. The findings were reported by TechRadar on January 9, 2026.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline