Titaniam

Hacker posts exploits for over 49000 vulnerable Fortinet VPNs

This article about how information about 49,000 vulnerable Fortinet VPNs have been posted online by hackers, has been making the rounds today. Given that the vulnerability in question has been known since 2018, most have used this as way to illustrate the importance of patching. Something that has not been pointed out so far is the direct correlation between posted IP Addresses and their direct link to organizations that own them. This is exactly why NIST classifies IPs as sensitive data.

Did you know that Titaniam can remove all clear text IP Addresses in-use while still retaining IP related functionality i.e range/subnet/CIDR/lists and more?

Always on data-in-use protection is finally here and enterprises can get to zero clear text for all sensitive data of all kinds, at all stages of the data lifecycle (at-rest, in-motion and in-use), at all times. Titaniam should be integrated as part of the foundational enterprise security toolbox.

Interested in learning more about how Titaniam can help? Get started today with a demo

https://www.bleepingcomputer.com/news/security/hacker-posts-exploits-for-over-49-000-vulnerable-fortinet-vpns/