Skip to main content

Check out the latest blog on the FortiManager exploitation. This high risk vulnerability has confirmed exploits and we want to make sure you are prioritizing this vulnerability to keep your organization protected.  Google Cloud Security is on a mission to support all of our customers with timely and actionable intelligence gathered from the frontlines. Google Security Operations and Google Threat Intelligence customers can benefit from the intel today directly within the products. 


Google SecOps Enterprise+ users will find the rules released to the Mandiant Intel Emerging Threats rule pack (within the Windows Threats group), and IOCs are available for prioritization with Applied Threat Intelligence. Enterprise+ users are encouraged to enable the Mandiant Intel Emerging Threats and Applied Threat Intelligence curated detections rule packs. 


Google SecOps Enterprise and Standard users can create single or multi-event custom rules using the information shared in the blog. 


Google Threat Intelligence users can find more intelligence about the vulnerability, threat actor (UNC5820) actively exploiting the vulnerability, and a list of IOCs with the portal. 


For more details we encourage you to read the full blog posted here.

Be the first to reply!

Reply