{
	"id": "ee331e1f-a6bc-41b1-818f-2007b881767e",
	"created_at": "2026-04-06T00:11:37.764721Z",
	"updated_at": "2026-04-10T13:12:15.558337Z",
	"deleted_at": null,
	"sha1_hash": "95504b9baeede62f8113105c795692feb5527da1",
	"title": "Cloud-Native Application Protection Platform (CNAPP)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1028196,
	"plain_text": "Cloud-Native Application Protection Platform (CNAPP)\r\nArchived: 2026-04-05 16:27:24 UTC\r\nFortinet logo\r\nOverview\r\nSolutions\r\nCase Studies \u0026 Awards\r\nCloud Service Providers\r\nResources\r\nIntroducing FortiCNAPP\r\nFortiCNAPP helps quickly manage risk, rapidly detect and respond to active threats, boost developer productivity\r\nand increase security effectiveness.\r\nWatch Now\r\nSimplify and Strengthen Cloud Security\r\nFortiCNAPP unifies fragmented tools into a single platform to simplify and strengthen cloud security. It\r\nempowers teams to maximize their impact on security with minimal time and effort by automatically connecting\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 1 of 8\n\nrisk insights with runtime threat data, ensuring they prioritize and address the most critical security risks and\r\nactive threats.\r\nRapidly Detect and Mitigate Zero-Day Threats\r\nContinuously monitor workloads and detect unusual behavior without the need to write and maintain rules.\r\nAutomatically discover early signs of compromised credential, ransomware, and cryptojacking attacks before their\r\npatterns are defined. Achieve faster identification of issues, quicker response times, and greater security efficacy\r\nwith patented machine learning and integrations with the Fortinet Security Fabric and leading workflow tools.\r\nSee it now: How to detect threats\r\nPrioritize What Matters Most\r\nQuickly visualize complex relationships between entities, risks, and threats to gain deeper insight into potential\r\nattack paths. Understand the risk of lateral movement and privilege escalation by attackers. Instantly assess the\r\nexploitability and impact of critical vulnerabilities and misconfigurations. Boost operational efficiency and\r\nmaximize the impact on security by effectively prioritizing the issues that matter most.\r\nSee it now: How to prioritize risks\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 2 of 8\n\nUnderstand Which Cloud Identities Pose the Greatest Risk\r\nGain comprehensive and continuous visibility into all users, resources, groups, and roles across multiple cloud\r\nservice providers. Automatically determine each identity’s net-effective permissions and identify those with\r\nexcessive privileges. Quickly prioritize the most at-risk identities with personalized risk scores based on multiple\r\nfactors. Streamline permission right-sizing and accelerate least-privilege access with automated remediation\r\nguidance.\r\nSee it now: How CIEM works\r\nSimplify and Accelerate Cloud Compliance\r\nAutomatically map cloud assets, configurations, and activity to compliance frameworks including PCI DSS,\r\nHIPAA, SOC 2, and ISO 27001. FortiCNAPP continuously assesses posture across AWS, Azure, and GCP,\r\nidentifies misconfigurations, and prioritizes remediation efforts to reduce audit fatigue. With real-time policy\r\nchecks, detailed reporting, and integration with the Fortinet Security Fabric, you can streamline audits, minimize\r\nrisk, and confidently prove compliance at any scale.\r\nSee it now: How to achieve continuous compliance\r\nFeatures and Benefits\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 3 of 8\n\nWith FortiCNAPP, cloud and security operations teams benefit from reduced complexity, greater visibility, and\r\nenhanced security effectiveness – all through a single unified, AI-driven platform.\r\nGain unmatched visibility\r\nAchieve proactive, stronger, and more efficient security by understanding how everything is interconnected from\r\ncode to cloud\r\nUnify cloud security\r\nSimplify and strengthen security with a unified platform that reduces detection, investigation, and response times\r\nDetect Zero-Day Threats\r\nQuickly discover active threats like compromised credentials, ransomware, and cryptojacking before their attack\r\npatterns are defined\r\nEnhance anomaly detection\r\nDetect unusual behavior and reduce alert noise without the need to write or maintain endless, complex rule sets\r\nPrioritize risk\r\nMaximize security outcomes with minimal time and effort by gaining insights into the exploitability and impact of\r\neach risk and threat\r\nStay compliant\r\nEase and streamline continuous cloud compliance and keep pace with changing regulatory requirements and\r\nindustry best practices\r\nKubernetes (K8s) Security\r\nReduce the risk of misconfigured Kubernetes services and continuously monitor Kubernetes environments for\r\nabnormal and risky behavior\r\nCode Security\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 4 of 8\n\nShift security left by finding and fixing open-source vulnerabilities, first-party code weakness, and misconfigured\r\nInfrastructure-as-Code\r\nCase Studies \u0026 Awards\r\nCareem\r\nIndustry-Leading Delivery App, Careem, Boosts DevSecOps Efficiency with Fortinet Cloud Security\r\nCoveo\r\nHow Coveo Gained Cloud Visibility and Reduced Risk with FortiCNAPP\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 5 of 8\n\nAOK Systems GmbH\r\nAOK Systems GmbH Efficiently Secures Sensitive Healthcare Data with FortiCNAPP\r\n2025 SC Award – Best Cloud Workload Protection Solution\r\nFortiCNAPP has earned the 2025 SC Award for Best Cloud Workload Protection Solution, a prestigious honor\r\nrecognizing excellence in securing cloud-native workloads. This award offers third-party validation that\r\nLacework FortiCNAPP is an effective, top-tier CNAPP.\r\nRead the Article\r\nCloud Service Providers\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 6 of 8\n\nMicrosoft Azure\r\nGain nonstop protection and control checks with comprehensive, continuous, and end-to-end Azure security.\r\nGoogle Cloud\r\nStreamline continuous compliance, manage vulnerabilities, and detect threats in Google Cloud with more\r\nautomation.\r\nResources\r\nResource Type\r\neBooks\r\nData Sheets\r\nOverview\r\nSolution Briefs\r\nSchedule a FortiCNAPP Demo\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 7 of 8\n\nCloud security is fundamentally a data problem. If your current rules-driven cloud security solution can’t scale,\r\nthen discover how you can automate security and compliance across AWS, Azure, Google Cloud, and private\r\nclouds with FortiCNAPP.\r\nWatch our demo and see how we can help you:\r\nInvestigate threats 80% faster\r\nConsolidate your security tools\r\nEliminate false positives by 95%\r\nReduce critical security alerts to about 1.4 per day\r\nSource: https://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nhttps://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/\r\nPage 8 of 8",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.lacework.com/blog/8220-gangs-recent-use-of-custom-miner-and-botnet/"
	],
	"report_names": [
		"8220-gangs-recent-use-of-custom-miner-and-botnet"
	],
	"threat_actors": [],
	"ts_created_at": 1775434297,
	"ts_updated_at": 1775826735,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/95504b9baeede62f8113105c795692feb5527da1.pdf",
		"text": "https://archive.orkl.eu/95504b9baeede62f8113105c795692feb5527da1.txt",
		"img": "https://archive.orkl.eu/95504b9baeede62f8113105c795692feb5527da1.jpg"
	}
}