Fortinet Company Blogs

  • Provide Customers with Advanced Threat Defense Against Email-Based Attacks

    Provide Customers with Advanced Threat Defense Against Email-Based Attacks

    Cybercriminals use email to trick users into providing login credentials or initiating fraudulent transactions, as well as to unknowingly install malware, ransomware, and other malicious payloads....

    Read Article
  • GandCrab 2.1 Ransomware on the Rise with New Spam Campaign

    GandCrab 2.1 Ransomware on the Rise with New Spam Campaign

    Recently, FortiGuard Labs has been observing a surge in an email spam campaign delivering the latest GandCrab v2.1 ransomware. This article provides a basic overview of this malicious campaign,...

    Read Article
  • Executive Insights: Talking Security and Threat Protection for Connected Cars

    Executive Insights: Talking Security and Threat Protection for Connected Cars

    Fortinet recently talked with Craig Johnson, Director, Automotive Advanced Systems Innovation Department, Renesas Electronics America Inc. to discuss the innovation behind its connected car...

    Read Article
  • Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner

    Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner

    Recently, FortiGuard Labs uncovered a new python-based cryptocurrency mining malware that uses the ETERNALROMANCE exploit, that we have dubbed “PyRoMine.” In this article, I provide an analysis of...

    Read Article
  • Zero Day Risks and the Return of Hacking Team

    Zero Day Risks and the Return of Hacking Team

    There are basically two kinds of threats organizations and users face today: the ones that security vendors and threat researchers know about, and those they don’t. The ones we know about get...

    Read Article
  • New Trickbot Plugin Harvests Email Addresses from SQL Servers, ScreenLocker Module Not for Ransom

    New Trickbot Plugin Harvests Email Addresses from SQL Servers, ScreenLocker Module Not for Ransom

    Just a week after publishing our discovery of Trickbot’s networkDLL, the FortiGuard Labs monitoring system has found a new module called squlDll that is being actively distributed to the banking...

    Read Article
  • How the Fortinet Veterans Program is Helping to Bridge the Cybersecurity Skills Gap

    As technology usage expands across the globe, so too does the threat landscape and the number of attackers looking to disrupt services and steal data for financial gain. As a result, there is a...

    Read Article
  • RSA 2018: Cutting Through The Noise

    RSA 2018: Cutting Through The Noise

    Building an effective security framework designed for your organization needs to start with three basic strategies. With these best practices in place, you should be able to quickly cut through...

    Read Article
  • The Critical Need for Threat Intelligence

    The Critical Need for Threat Intelligence

    Information sharing is one of the most critical elements of any security strategy. Without it, security has to be painted with abroad brush when literally anything is possible. Being able to...

    Read Article
  • Fortinet and IBM: Working Together to Address Today’s Digital Transformation Challenges

    Fortinet and IBM: Working Together to Address Today’s Digital Transformation Challenges

    To help organizations adapt to the new realities of the emerging digital marketplace and the related threats targeting digital businesses, IBM Security just announced X-Force Threat Management. We...

    Read Article
  • Are Endpoints Integrated Into Your Network Security Strategy?

    Are Endpoints Integrated Into Your Network Security Strategy?

    Endpoint security is the responsibility of far more than the endpoint or desktop IT team. In fact, it is required to be understood and leveraged by anyone who is responsible for the organization’s...

    Read Article
  • Q&A: Securing the Move to the Cloud

    Q&A: Securing the Move to the Cloud

    In the past decade, cloud computing has become increasingly popular among enterprises, with Gartner Research projecting IT spending on public cloud-based infrastructure services to surpass...

    Read Article
  • Innovation Insights: Fortinet Extends the Security Fabric into the Cloud

    Innovation Insights: Fortinet Extends the Security Fabric into the Cloud

    To compete successfully, today’s organizations are having to develop new ways to connect users, devices, data, applications, and services together. To do this they are adopting a variety of...

    Read Article
  • Fortinet Secures Workloads on AWS

    Fortinet Secures Workloads on AWS

    Fortinet is proud to be a Silver Sponsor of the 2017 Amazon Web Services (AWS) Summit being held April 5th and 6th in Sydney, Australia at the Hordern Pavilion & Royal Hall of Industries.

    Read Article
  • Fortinet Joins AWS Public Sector Partner Program to Accelerate Cloud Security for Government and SLED Organizations

    Fortinet Joins AWS Public Sector Partner Program to Accelerate Cloud Security for Government and SLED Organizations

    With the breadth of sensitive data and highly regulated workloads that government and state and local education (SLED) institutions manage comes the critical need for a cybersecurity strategy that...

    Read Article
  • Autoscaling Cloud Security

    Autoscaling Cloud Security

    The Fortinet Security Fabric spans the entire distributed network, from IoT to the cloud, to provide an integrated and collaborative approach to securing the next generation of networks and threats.

    Read Article
  • Fortinet Delivers the Industry’s First Integrated NOC-SOC Solution

    Fortinet Delivers the Industry’s First Integrated NOC-SOC Solution

    Fortinet just announced at the RSA Conference 2018 the industry’s first purpose-built NOC-SOC solution designed to bridge workflows, analysis, and automated response between operational and...

    Read Article
  • Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot

    Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot

    At FortiGuard Labs we were interested in searching out other malware that leverages Mirai code modules. Interestingly, one of the families that showed up in our search was the Hide ‘N Seek (HNS)...

    Read Article
  • Recent Healthcare Regulations and Guidelines Providers Should Be Aware Of

    Recent Healthcare Regulations and Guidelines Providers Should Be Aware Of

    Healthcare has long been a regulated space due to the sensitive personal information collected and stored. Top of mind when thinking of healthcare regulations is HIPAA, which provides...

    Read Article
  • Cloud-Based Malware Weather Forecast for Financial Firms

    Cloud-Based Malware Weather Forecast for Financial Firms

    The explosion of new applications and connected IoT devices has created a wealth of data that, when analyzed, provides businesses with critical insights into consumer behaviors and interests,...

    Read Article
  • loading
    Loading More...