Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes how to combat the CosmicEnergy malware with FortiDeceptor. Scope The Deception Decoys & lures against the 'CosmicEnergy Malware' attacks can be used in FortiDeceptor V.3.3 and above. Solution A new malware called Co...
Description This article describes how FortiDeceptor Decoys can detect activities related to The Joomla!.CMS.Webservice.API.index.php.Unauthorized. CVE-2023-23752 access can lead to unauthorized access to web services endpoints. Joomla! is a free, op...
Description This article describes that In a typical ransomware attack, hackers use phishing or other means to introduce malware onto a victim's computer system that then spreads across the network. Once enough systems have been compromised, the hack...
Description This article describes how FortiDeceptor Decoys can detect activities related to the Apache Text4Shell Vulnerability CVE-2022-42889 & CVE-2022-33980 that can lead to a remote code execution vulnerability. 'Apache Commons Text is a low-lev...
Description This article describes how to use FortiDeceptor Deception Decoys and Lure to detect activities related to Microsoft Exchange CVE-2021-34473-SSRF and CVE-2022-41082 vulnerabilities that allow RCE against Microsoft Exchange servers. For mor...