Hackers Actively Exploits Patched Fortinet FortiGate Devices to Gain Root Access
Fortinet has uncovered a sophisticated post-exploitation technique used by a threat actor to maintain unauthorized access to FortiGate devices, even after initial vulnerabilities were patched.…