Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes that In a typical ransomware attack, hackers use phishing or other means to introduce malware onto a victim's computer system that then spreads across the network. Once enough systems have been compromised, the hack...
Description This article describes how FortiDeceptor Decoys can detect activities related to the Apache Text4Shell Vulnerability CVE-2022-42889 & CVE-2022-33980 that can lead to a remote code execution vulnerability. 'Apache Commons Text is a low-lev...
Description This article describes how to use FortiDeceptor Deception Decoys and Lure to detect activities related to Microsoft Exchange CVE-2021-34473-SSRF and CVE-2022-41082 vulnerabilities that allow RCE against Microsoft Exchange servers. For mor...
Description This article describes how to use FortiDeceptor Decoys to detect activities related to The critical privilege escalation security flaw (CVE-2022-3180), which enables unauthenticated attackers to add a rogue user with admin privileges to t...
Description This article describes how FortiDeceptor Decoys can detect activities related to the CVE-2021-36260, a command injection vulnerability in the web server of some Hikvision products. Due to insufficient input validation, an attacker can exp...