Werbefrei,
für immer!
Fortinet Technical Tips
- von kumarhDescription This article describes a situation where the Security Fabric displays a Disconnected status between a root FortiGate and a child FortiGate when the serial number of a secondary High […]
- von akileshcDescription This article describes a common configuration mistake when forwarding SSL VPN traffic into an IPsec tunnel in Hub-and-Spoke deployments using dynamic routing. Scope FortiOS. Solution Administrators often configure a […]
- von nabanesDescription This article describes the list of consolidated Site-to-Site VPN configuration files for FortiGate devices, and applies to environments where multiple FortiGates are connected through Site-to-Site VPN tunnels and require […]
- von adimailigDescription This article describes how to enable USB Tethering using a mobile phone on FortiGate. Scope FortiGate. Solution USB Tethering is the process of sharing the internet connection of a […]
- von pjangDescription This article describes a known behavior where a new IPsec tunnel interface named fext-ipsec-wMEO is added to the FortiGate right after a new FortiExtender is connected for management. Scope FortiGate, […]
- von hamidrDescription This article describes how a FortiGate HA failover in Google Cloud can delete SDN routes without recreating them if the failover is interrupted, and provides guidance on why it […]
- von ssangaDescription This article describes an issue where the faceplate fails to load or keeps spinning when editing a physical interface or a one-arm sniffer interface. Scope FortiGate v7.6.4. Solution The […]
- von pmeetDescription This article describes the Firewall Policy change based on policy view when multiple interface policy is enabled and are in use. Scope FortiOS. Solution When a firewall policy makes references […]
- von agodboleDescription This article describes how to create a custom automation stitch that runs a CLI script and sends its output to email when the automation stitch is triggered. Scope […]
- von ssangaDescription This article describes an issue where a Read-Only user is presented with the 'Login Read-Write' option when attempting to login to a FortiGate after upgrading to FortiOS v7.6.4. This […]
Fortinet Firmware Updates
- FortiPortal 7.0.13 B0279 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiOS-6K7K 7.0.18 B0289 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiNDR 7.4.10 B0555 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiSandbox 5.0.5 B0141 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiAnalyzer 7.0.15 B0697 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiManager 7.0.15 B0697 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiOS 7.0.18 B0695 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiSwitchAXChassis 1.0.0 B0003 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiAnalyzer-BigData 7.2.11 B0702 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiSIEM 7.1.9 B0198 and release notes are available for download from the Support site : https://support.fortinet.com
Fortinet Thread Blog
- FortiGuard Labs analyzes TruffleNet, a large-scale campaign abusing AWS SES with stolen credentials and linked to Business Email Compromise (BEC).
- FortiGuard IR analysis of H1 2025 shows financially motivated actors increasingly abusing valid accounts and legitimate remote access tools to bypass detection, emphasizing the need for identity-centric defenses.
- FortiGuard Labs has tracked a hacker group expanding attacks from Mainland China to Malaysia, linking campaigns through shared code, infrastructure, and tactics.
- A new Stealit campaign uses Node.js Single Executable Application (SEA) to deliver obfuscated malware. FortiGuard Labs details tactics and defenses. Learn more.
- FortiGuard Labs details Chaos-C++, a ransomware variant using destructive encryption and clipboard hijacking to amplify damage and theft. Read more.
- FortiGuard Labs has uncovered a shift in the tactics of threat actor Confucius, from stealers to Python backdoors, highlighting advanced techniques used in South Asian cyber espionage. Read more.
- A phishing campaign in Ukraine uses malicious SVG files to drop Amatera Stealer and PureMiner, enabling data theft and cryptomining. Learn more.
- FortiGuard Labs uncovered an SEO poisoning campaign targeting Chinese users with fake software sites delivering Hiddengh0st and Winos malware.
- FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.
- FortiGuard Labs uncovers a phishing campaign using fake emails and UpCrypter malware to deliver RATs like PureHVNC and DCRat across industries.
Cert Bund News
- Ein Angreifer kann mehrere Schwachstellen in Keycloak ausnutzen, um beliebigen Programmcode auszuführen, und um Sicherheitsvorkehrungen zu umgehen.
- Ein Angreifer kann mehrere Schwachstellen im Linksys-Router ausnutzen, um beliebigen Code auszuführen, Speicherbeschädigungen zu verursachen und einen Denial-of-Service-Zustand herbeizuführen.
- Ein Angreifer kann mehrere Schwachstellen in IBM AIX ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um Dateien zu manipulieren, und um beliebigen Programmcode mit Root Rechten auszuführen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Fortinet FortiWeb ausnutzen, um Administratorrechte zu erlangen.
- Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Cisco Catalyst Center Virtual Appliance ausnutzen, um Administratorrechte zu erlangen und Spoofing-Angriffe durchzuführen.
- Ein Angreifer kann mehrere Schwachstellen in Cisco Catalyst ausnutzen, um Sicherheitsmaßnahmen zu umgehen, beliebigen Code mit Root-Rechten auszuführen und Cross-Site-Scripting-Angriffe durchzuführen.
- Ein Angreifer kann mehrere Schwachstellen in PostgreSQL ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in HP LaserJet ausnutzen, um Informationen offenzulegen.
- Ein Angreifer kann mehrere Schwachstellen in CUPS (Filters) ausnutzen, um Informationen offenzulegen oder einen Denial of Service herbeizuführen.
- Ein Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuführen, um Sicherheitsvorkehrungen zu umgehen, um Dateien zu manipulieren, und um seine […]
Microsoft Exchange Team Blog
RSS-Fehler: A feed could not be found at `https://techcommunity.microsoft.com/plugins/custom/microsoft/o365/custom-blog-rss?tid=6850040437866647932&board=Exchange&size=25`; the status code is `404` and content-type is `text/html;charset=UTF-8`
MSXFAQ Newsfeed
- 14. Nov 25 Exchange SE Licensing – Exchange OnPremise CAL über Exchange Plan1/2
- 14. Nov 25 Migration zu Exchange SE – So komme ich schnell von Exchange 2016 zu Exchange SE
- 10. Nov 25 30.000 unsichere Exchange Server – Das BSI warnt und wie können Sie als betroffene Firma damit umgehen?
- 09. Nov 25 Entra ID und Domain Federation – Besonderheiten bei Cloud-Benutzern mit Authentifizierung über lokalen Anmeldedienst mit Federation
- 31. Okt 25 RBAC for Applications mit Exchange Online – Zugriff als Applikation per Graph/IMAP auf einzelne Postfächer statt "ReadWriteAll. So geht es mit RBAC for Apps
- 30. Okt 25 Exchange Online Provisioning – Aktualisierung der Optionen mit isCloudManaged und einem Zeitstahl zur Erklärung
- 30. Okt 25 Exchange Versionen analysieren – Wie kann ich von extern sehen, welche Firma welche Exchange Version nutzt?
- 15. Okt 25 Banken prüfen Empfänger – Seit 7. Okt prüfen Banken den Kontoinhaber bei der Überweisung. Einige warnen nur, andere liefern den vollen Inhaber-Namen
- 13. Okt 25 Exchange OWA Anmeldung und Logout – Abmeldung in OWA trotz NTLM/Kerberos Constraint Delegation mit Reverse Proxy/Loadbalancer
- 13. Okt 25 Fax und Datenschutz – Eine Kreisverwaltung sendet wg. Datenschutz keine Bescheide per Mail sondern per Fax oder ZIP-Mail mit Kennwort per Mail

