Description This article describes how to combat the CosmicEnergy
malware with FortiDeceptor. Scope The Deception Decoys & lures against
the 'CosmicEnergy Malware' attacks can be used in FortiDeceptor V.3.3
and above. Solution A new malware called Co...
Description This article describes how FortiDeceptor Decoys can detect
activities related to The
Joomla!.CMS.Webservice.API.index.php.Unauthorized. CVE-2023-23752 access
can lead to unauthorized access to web services endpoints. Joomla! is a
free, op...
Description This article describes that In a typical ransomware attack,
hackers use phishing or other means to introduce malware onto a victim's
computer system that then spreads across the network. Once enough
systems have been compromised, the hack...
Description This article describes how FortiDeceptor Decoys can detect
activities related to the Apache Text4Shell Vulnerability CVE-2022-42889
& CVE-2022-33980 that can lead to a remote code execution vulnerability.
'Apache Commons Text is a low-lev...
Description This article describes how to use FortiDeceptor Deception
Decoys and Lure to detect activities related to Microsoft Exchange
CVE-2021-34473-SSRF and CVE-2022-41082 vulnerabilities that allow RCE
against Microsoft Exchange servers. For mor...