Fortinet FortiGate devices face automated attacks creating rogue accounts

Automated attacks are targeting Fortinet FortiGate devices, creating unauthorized accounts and stealing firewall data. A recent patch from Fortinet may not be as effective as anticipated. The issue was reported on January 23, 2026.

Fortinet FortiGate devices, widely used in network security, are under attack through automated methods that generate rogue accounts and extract sensitive firewall data. According to a TechRadar report published on January 23, 2026, these incidents highlight ongoing vulnerabilities in the devices.

The attacks exploit weaknesses that persist despite a recent Fortinet patch, which appears to fall short in fully addressing the threats. Security experts note that such automated campaigns can rapidly compromise multiple systems, potentially leading to broader network breaches.

Fortinet has not issued further details on the patch's limitations in the available information, but the report underscores the need for users to monitor their devices closely and apply any updates promptly. This development raises concerns about the effectiveness of current cybersecurity measures against evolving automated threats.

관련 기사

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI에 의해 생성된 이미지

Researchers discover SSHStalker botnet infecting Linux servers

AI에 의해 보고됨 AI에 의해 생성된 이미지

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Security experts are warning that ransomware attacks are now more frequently targeting firewalls. They advise organizations to secure these critical network defenses promptly. The alert comes amid rising cyber threats.

AI에 의해 보고됨

WatchGuard has addressed a critical remote code execution vulnerability in its Firebox OS firewall software. The company urges users to update immediately to mitigate the risk. The flaw was identified by the firewall maker itself.

Veeam has addressed three critical-severity security vulnerabilities that could expose backup servers to remote code execution attacks. The company issued patches to mitigate these risks. The announcement highlights ongoing concerns in cybersecurity for data protection tools.

AI에 의해 보고됨

2025년 필리핀의 사이버 위협은 피싱과 랜섬웨어 같은 전통적 방법에 머물렀으며 새로운 형태는 등장하지 않았다. 그러나 인공지능이 이러한 공격의 양과 규모를 증폭시켜 '사이버 범죄의 산업화'를 초래했다. 여러 사이버 보안 업체의 보고서는 사건의 속도, 규모, 빈도의 증가를 강조한다.

Zyxel has issued a warning about a critical remote code execution (RCE) security flaw that could affect more than a dozen of its routers. The company has addressed a handful of concerning vulnerabilities in its devices. This update comes as part of ongoing efforts to secure networking equipment.

AI에 의해 보고됨

IBM's artificial intelligence tool, known as Bob, has been found susceptible to manipulation that could lead to downloading and executing malware. Researchers highlight its vulnerability to indirect prompt injection attacks. The findings were reported by TechRadar on January 9, 2026.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부