home.social

#fortra — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #fortra, aggregated by home.social.

  1. ⚠️ Critical CVSS 10 flaw in Fortra’s GoAnywhere MFT (CVE-2025-10035) lets attackers inject commands and take over sensitive systems. Patch to v7.8.4 now.

    Read: hackread.com/critical-cvss-10-

    #CyberSecurity #Vulnerability #Fortra #GoAnywhere #Infosec

  2. Sponsor Shout-out!
    We are proud to announce Fortra as a sponsor for Adversary Village at @defcon 33! Their commitment to security excellence and community, helps us create an impactful village for leaders and practitioners in offensive cyber security and adversary attack simulation research.
    Thank you, @fortraofficial team, for believing in our mission and helping us make this happen!
    Learn more about Fortra
    fortra.com/
    #Fortra CobaltStrike #CobaltStrike #DEFCON33 #AdversaryVillage Outflank #AdversarySimulation #DEFCON @AdversaryVillage

  3. Happy to announce Fortra as our Bronze sponsor for Adversary Village at @defcon 32 Hacker convention, Las Vegas!
    Thanks to the Fortra #CobaltStrike Outflank team for the support and contribution towards the adversary village community.

    Meet @fortraofficial your cybersecurity ally! Fortra is the leader in offensive cyber security tooling and security services.
    URL: fortra.com

    For more information, visit: adversaryvillage.org/adversary
    Join our Discord server: adversaryvillage.org/discord

    #AdversaryVillage #DEFCON32 #AdversarySimulation
    #PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #Fortra #CobaltStrike #OutFlank #DEFCON #AttackSimulation

  4. The cyber crims are working through the holidays, and so are we. Here's Monday's newsletter on all the developments in infosec, just for you:

    opalsec.substack.com/p/soc-gou

    International law enforcement agencies notched up another win last week, having successfully taken down the notorious Initial Access Broker Genesis Marketplace last week - or did they? The site remains active and the admins appear to have gotten away unscathed, so what victory was there to be had?

    #Microsoft, in collaboration with #Fortra and the Health ISAC, are commencing work to dismantle infrastructure used by actors abusing cracked versions of the offensive Cobalt Strike framework. It'll be an uphill battle, and it remains to be seen if they can make a dent in the sprawling global footprint achieved by the cyber crim's implant of choice.

    Be warned - a PoC exploit has been released for a CVSS 10.0 Sandbox Escape vulnerability impacting the VM2 JavaScript Sandbox, which itself has >16 million monthly downloads on #npm. Researchers have also uncovered a vulnerability in #WiFi APs that could allow hijacking and snooping of client traffic; #Apple patches two actively exploited 0-days in #iOS, #iPadOS and #macOS, and #CISA urges patching of #Zimbra bugs exploited by Russian APTs.

    The #redteam have some great tooling and tradecraft to help with Microsoft #MFA enumeration and performing port forwarding on compromised #Cisco gear, while the #blueteam are again spoiled for choice - a new database of exploited drivers, research on abuse of SFX archives for persistence, and threat models for #AWS KMS and CI/CD pipelines - take your pick!

    Check out the newsletter and catch all this and much more excellent threat and tradecraft research, to help you gear up for the week ahead:

    opalsec.substack.com/p/soc-gou

    Happy Easter Monday to everyone lucky enough to be enjoying the holiday, I hope you're all having a great break wherever you are, and a reminder that if you're travelling on the roads, to please drive safe!

    #infosec #cyber #news #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #newsletter #hacking #security #technology #hacker #vulnerability #vulnerabilities #exploit #PoC #malware #ransomware #dfir #soc #threatintel #threatintelligence #DarkWeb #CobaltStrike #IAB #InitialAccessBroker #GenesisMarketplace