Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes how FortiDeceptor decoys can detect activities related to The Microsoft Driver RCE vulnerability - CVE-2022-26809 remote code execution vulnerability. A critical remote code execution vulnerability in Remote Procedu...
Description This article describes how FortiDeceptor Decoys can detect activities related to The Spring4Shell CVE-2022-22965 remote code execution vulnerability. A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote...
Description This article describes how to use FortiDeceptor Deception Decoys and Lure to detect activities related to PTC's Axeda solution which is collectively called 'Access:7' Supply Chain Vulnerabilities. For more information on the vulnerabiliti...
Description This article describes how to use FortiDeceptor and Deception Tokens to detect activities related to the new Active Directory Privilege Escalation attack, CVE-2021-42287, and CVE-2021-42278. This escalation attack allows attackers to easi...
Description This article describes how FortiDeceptor Decoys can detect activities related to the Log4j2 CVE-2021-44228 CVE-2021-45046 CVE-2021-45105 remote code execution vulnerability. A 0-day exploit was discovered on a popular Java library Log4j2 ...