BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
(darkreading.com)
1.
2.
3.
Hackers breach Fortinet FortiGate devices, steal firewall configs
(bleepingcomputer.com)
4.
Hackers exploit newly patched Fortinet auth bypass flaws
(bleepingcomputer.com)