https://www.ilsoftware.it/fortigate-ssl-vpn-nel-mirino-come-agiscono-gli-hacker-dopo-laccesso/
I started a company!
“What? Huh? Why?”
Those are some of the many questions I was asking myself. Simply… Looking to challenge the brain in different ways than what I’m normally doing.
How it began – In my personal time while trying to secure my own personal hosted infrastructure, I was noticing that there wasn’t an efficient or effective way to block bad threat actors (nasty hackers) on the Internet.
The typical (tedious) approach has always been:
The problem with this approach is that you end up getting stuck in a game of whack-a-mole. Who do you think wins? Trick question – it’s not you!
I put a different idea together – what if bad threat actors run their hacking world like a business and focus on cost optimization and automation. Novel idea right?
How does this apply to what I do? Well if I were to run a business like theirs, I would figure out how to “copy/paste” my attacks in creative ways. To do this, I would choose a (cheap) hosting provider that has resources that I can use for my desired purposes. Once the hosting provider is identified, I’m going to figure out ways to spin up new resources in a quick manner in a different location (i.e. automation).
New Resource + New Location = New IP Address To Attack From
Now that I know this, let the hacking begin!
Do you see how the game of whack-a-mole starts?
What does my company do?
I have a few products available now, but the one product that solves the above problem is a product called Molasses Masses.
How does it work?
Rather than blocking on a per-IP basis, I get all the subnets for that hosting provider that the hacker is using and then block those. The idea is that remote connections coming to my/your hosted services, should not come from other hosting providers. It should be from people like you reading this article!
Now it’s possible that you or your business partners get caught up in the block list – no problem! You can exclude your own and/or business partner subnets from the specifically curated list of subnets that you download.
How effective it this?
I’ve seen a reduction of attacks of up to 90%* from all my honeypots on the Internet.
Why would you use this?
Got remote users that need to VPN into your organization?
Got hosted services that should be accessed from actual users, and not random bots sitting in hosted environments?
Then this is the product for you!
Integrations available?
Very simply, It’s a flat text file of curated subnets that you can use in your own policies..
These are the supported platforms available today to consume my product:
Curious to test it out? 7-day free trials available.
Use discount code MM2026 to snag a 20% discount on checkout for the first 50 customers 🙂
* As with all things in life – your mileage may vary. You might have a different environment compared to mine which gives different results. #AntiHacking #BotMitigation #BruteForceProtection #CiscoFTD #CloudSecurity #CyberSecurity #Cybersecurity #DDoSProtection #Fortigate #Honeypot #InfoSec #IPBlocking #MolassesMasses #NetworkSecurity #PaloAltoNetworks #security #Shorewall #SubnetFiltering #SysAdmin #technology #threatIntelligence #VPNTrust #ZeroTrust🚨 FortiGate edge intrusions are enabling deep network compromise.
Attackers exploit vulnerabilities and weak credentials to extract config files, obtain AD service credentials, deploy RMM tools, and exfiltrate NTDS.dit hashes.
How AI Assistants are Moving the Security Goalposts
https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/
#JamiesonO'Reilly #ALittleSunshine #LatestWarnings #TheComingStorm #SauravHiremath #RiskyBusiness #SimonWillison #OrcaSecurity #WebFraud2.0 #AIassistant #JamesWilson #MattSchlict #LauraEllis #agenticAI #AmazonAWS #Anthropic #FortiGate #microsoft #RoiNisimi #SummerYue #AIagents #ClawdBot #grith.ai #Moltbook #OpenClaw #CJMoses #Copilot #Moltbot #Claude
CyberStrikeAI used in 600+ FortiGate intrusions across 55 countries.
AI-driven exploit orchestration + 100+ integrated tools.
21 IPs tied to China-based infra.
Patch FortiGate immediately.
Full report:
https://www.technadu.com/cyberstrikeai-deployed-in-over-600-fortigate-attacks-targeting-55-countries/622100/
Bleeping Computer: Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks. “Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. A new report by CJ Moses, CISO of Amazon Integrated Security, says that the hacking campaign occurred between […]
https://rbfirehose.com/2026/02/28/amazon-ai-assisted-hacker-breached-600-fortinet-firewalls-in-5-weeks-bleeping-computer/
Bleeping Computer: Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks. “Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a c…
THREAT MODEL: CYBERSECURITY
for Feb. 24th, 2026
by independent journalist @violetblue
- People across the US are destroying #Flock cameras
- #Discord ’s “new” ID check tool was on a US government server
- #Arizona and #Colorado want ID scanning for all computer and phone use
- @wikipedia banned #ArchiveToday for DDoS attacks
- Some rando used #AI to hack #FortiGate
- @financialtimes unmasked a Russian oil smuggling ring (from Kremlin-controlled Rosneft) through the ring’s use of a single email server
- Another major #AotearoaNewZealand health app breach
- #TimCurry reveals Clue’s secret ending
- BBC/BAFTA leave N-word intact on tape delay
...and much more.
✨ THREAT MODEL is free to read -- please help keep it accessible to all by becoming a patron, even $1 a month makes a difference! ✨
https://www.patreon.com/posts/cybersecurity-24-151516976
#ThreatModel #ThreatModelCybersecurity #ThreatModelNewsletters #VioletBlue #infosec #cybersec #CovidIsNotOver
The categorization of the Fortinet web filter is hilarious. I got a report that a certain website is incorrectly blocked by our firewall. After looking into it, the specific website belongs to a large organization.
Different organizational levels of this large organization are categorized as:
The “correct” classification should be either general organization or simply “business”.
This is wrong on many levels. Why are advocacy groups blocked by default? Why do they have an R rating (because politics is only for adults? But then why only advocacy groups and not political organizations?).
#TIL Fortinet IPsec VPNs: they claim to support IKEv2 2FA (Certificate + EAP password), but they don't strictly enforce RFC 4739 for multiple authentication rounds.
If a native client (like strongSwan) ignores the cert and just asks for EAP, the FortiGate silently accepts it and falls back to password-only. It literally fails open!