New Fabric Connectors tie traditionally disparate security solutions into a single, integrated system to automate security workflows, tighten SOC environments, correlate threat feeds, and seamlessly enforce consistent security across the distributed security infrastructure, including multi-cloud environments.
Home » Fortinet Company Blogs » Fortinet Fabric Connectors: Enabling Deep Fabric Integration With Third Party Solutions
Buffer Overflow Attack Targeting Microsoft IIS 6.0 Returns
FortiGuard Labs has been documenting a spike in new attacks targeting a buffer overflow vulnerability in th...
Most Recent Articles
Defending Against an Automated Attack Chain: Are You Ready?
Threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.
AI Doesn’t Eliminate Jobs, It Creates Them
Automation and AI are not eliminating jobs, they are creating them — high-paying, high-level and secure ones at that — at an unprecedented rate. As the levels of data continue to grow, that will...
The Rise of Destructive Botnets
It is critical that every organization become aware of these emerging risks and begin to take appropriate countermeasures now. In the escalating cyberwar, enterprises need to be able to fight...
Microsoft Windows Remote Kernel Crash Vulnerability
At the end of January 2018, the FortiGuard Labs team discovered a remote kernel crash vulnerability in Microsoft Windows and reported it to Microsoft by following Fortinet’s responsible disclosure...
Two Options for Evolving Your IPS Solution
Every moment of every day an IPS system works to detect malicious content in network traffic to prevent attacks and exploits for organizations of all sizes. But as the digital infrastructure...
Threat Information Sharing Goes Far Beyond Simply Protecting Businesses
Threat intelligence sharing is critical in our digital society. Learn more about Fortinet's gobal stragtic partnerships with Interpol, and our training & education programs.
PyRoMineIoT: NSA Exploit, Monero(XMR) Miner, & IoT Device Scanner
In this article, we will discuss the changes made to PyRoMine, as well as how the ETERNALROMANCE exploit was used to distribute yet another Monero miner we have dubbed PyRoMineIoT.
You Can’t Protect What You Can’t See: Gaining Visibility in Endpoint Security
Implementing an integrated and automated security solution allows IT teams to discover, assess, and monitor endpoints to ensure security and compliance.
Fabric-Ready Partner Spotlight Q&A – CSPi
Fortinet recently talked with Gary Southwell, Managing Director, about CSPi’s security priorities and the tools they produce to keep customers’ information secure through automated breach...
Securing the Modernization of IT for State and Local Governments
State and local government entities are modernizing legacy IT systems. The modernization of security solutions should be done in tandem with these new deployments.
Is Cryptojacking Replacing Ransomware as the Next Big Threat?
Cryptojackers have clearly discovered that, if done properly, leveraging the processing power of a hijacked system to mine for cryptocurrencies can be a potentially long-term profitable venture.
Non-Russian Matryoshka: Russian Service Centers Under Attack
With the help of FortiGuard’s in-house Threat Intelligence Platform (Kadena), FortiGuard Labs discovered a series of attacks targeted at service centers in Russia. These service centers provide...
Could 5G Mutate the Threat Landscape?
IoT and 5G are important technological achievements that are changing the world. However, this optimism needs to be tempered with clear thinking and planning if we want to keep up with the...
New Threats, Old Threats - A Deeper Look
IT security teams stand a much better chance of defeating the latest cyber schemes when they know what to look for. Here are some key findings from Fortinet Threat Landscape Report.
VPNFilter Malware - Critical Update
As a member of the Cyber Threat Alliance (CTA), FortiGuard Labs received critical information and additional findings showing the VPNFilter campaign is targeting significantly more devices than...
FortiWeb Release 6.0: AI-based Machine Learning for Advanced Threat Detection
FortiWeb’s new machine learning (ML) technology delivers a different approach to threat detection to the web security market. This new approach leverages probability to identify threats rather...
Digital Transformation and Security Transformation Need to Walk Hand-in-Hand
At this phase of the global digital transformation, four areas stand out as particularly acute cybersecurity pain points.
Convergence of IoT and Access Control Technology
Fortinet acquires Bradford Networks enhancing the Security Fabric by converging access control and IoT security solutions for enhanced security for large enterprises. Learn more
Android Spyware Now Dropping Legit Apps?
Building on some previous research in the industry, FortiGuard Labs recently took a closer look at some Android malware impersonating the mobile version of the very popular game Fortnite.
Fortinet Showcases Advanced Security Solutions at the 2018 Gartner Security and Risk Management Summit