Fortinet is one of the first companies to participate in the expansion of the AWS WAF program with a set of four packaged rulesets. AWS WAF customers can choose from basic WAF rulesets that provide protection from cross-site scripting, SQL injection, and malicious botnets, while our advanced ruleset offers the latest general application attack types and known vulnerabilities.
Home » Fortinet Company Blogs » Fortinet Delivers Advanced Web Application Protection Through New Managed Rules for AWS WAF Service
Executive Insights: The Digital Transformation of Security
Ken Xie outlines how digital transformation is driving the evolution of security today and tomorrow.
Most Recent Articles
Azure Security Center and Fortinet: Integrated Threat Management Solution for Cloud Workloads
Over the last 18-24 months the embrace of public cloud for critical workloads has transitioned from the “investigative” stage to “plan of record” for the majority of organizations...
Shinoa, Owari, Mirai: What's with All the Anime References?
In September 2016, the Mirai source code was leaked on Hack Forums. Ever since, there has been an explosion of malware targeting IoT devices, each bearing the name of a protagonist found in...
Incomplete Patch: Another Joomla! Core XSS Vulnerability Is Discovered
A new vulnerability affects Joomla! CMS versions 3.0.0 through 3.8.7. In this blog, I’ll share my analysis of this vulnerability.
Closing the Sandbox Generation Gap
Changing times call for evolved security. 7 reasons why next-generation sandboxing is a requisite.
Defending Against the New VPNFilter Botnet
A newly reported botnet named VPNFilter targets SCADA/ICS environments by monitoring MODBUS SCADA protocols and exfiltrating website credentials.
I’ve Got Trickbot Under My Screen
FortiGuard Labs spotted yet another new module being distributed by the very active Trickbot banking malware using a technique called “Hidden VNC” (virtual network computer) to stealthily take...
Buffer Overflow Attack Targeting Microsoft IIS 6.0 Returns
FortiGuard Labs has been documenting a spike in new attacks targeting a buffer overflow vulnerability in the WebDAV service in Microsoft IIS 6.0, peaking on Apr 13, 2018 when we logged over 4...
Fortinet Fabric Connectors: Enabling Deep Fabric Integration With Third Party Solutions
New Fabric Connectors tie traditionally disparate security solutions into a single, integrated system to automate security workflows, tighten SOC environments, correlate threat feeds, and...
Realizing the Full Potential of Secure SD-WAN
The decision to deploy an SD-WAN may be straightforward, extracting the full range of benefits requires an in-depth evaluation of a variety of other supporting components. If ignored, it is all...
An Analysis of Microsoft Edge Chakra NewScObjectNoCtor Array Type Confusion (CVE-2018-0838)
CVE-2018-0838 is one of the ‘type confusion’ bugs in the Microsoft Edge Chakra Engine that was fixed by Microsoft three months ago. This bug causes memory corruption and can possibly be exploited...
A Wicked Family of Bots
As we continue to keep track of the latest IoT botnets, the FortiGuard Labs team has seen an increasing number of Mirai variants, thanks to the source code being made public two years ago. Since...
Building an Adaptive and Secure SD-WAN Framework
SD-WAN experts and industry analysts point out that an optimal enterprise SD-WAN solution needs to not only support WAN performance requirements, but also address security priorities.
Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
Fortinet FortiGuard Labs today unveiled the findings of its latest Global Threat Landscape Report. The research reveals an evolution of malware to exploit cryptocurrencies.
How the Fortinet Veterans Program is Helping to Bridge the Cybersecurity Skills Gap
The Fortinet FortiVet program is working to bridge the gap between the supply of veterans looking for post-service work and the need for qualified professionals across the cybersecurity industry.
Empowering Security in the CSP’s IoT Infrastructure and Services
CSPs are well-positioned to benefit from the continuing growth of Internet of Things (IoT) devices and related systems—but only as long as the infrastructure can support some IoT-specific...
What’s Missing in Your Digital Transformation Plan?
Because digital technologies are widely available to everyone, this flattens the competitive advantage. How an enterprise and a CSP manages their DX implementation becomes the defining factor of a...
How Fortinet Connects with Communications Service Providers (CSPs)
Fortinet’s charter with CSPs is to interpret market trends, address key issues, and help drive carrier businesses forward. By improving your competitive positioning, we help everyone make money....
Amazon GuardDuty and Automating Cloud Security with the Security Fabric
Fortinet is excited to announce the integration of the Security Fabric with Amazon GuardDuty to automate remediation and threat intelligence in Amazon Web Services. This integration accelerates...
Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember
Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organizations now adopting multi-cloud environments, the breadth and depth of the attack surface has...
MSSPs: Disrupting the SD-WAN Market for Fun and Profit