Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,...
Ensuring Cloud Cybersecurity at the Rate of Cloud Adoption
In an effort to meet consumer demands and business needs, moving business-critical infrastructure and opera...
Most Recent Articles
Top Cyber Trends in Healthcare Today: Q&A with Sonia Arista, National Healthcare Practice Director
The healthcare sector remains a top target for cyberattacks. We sat down with Sonia Arista, an expert in the field, to learn about key cyber trends affecting healthcare today, and where health...
Fortinet At Google Cloud Next 2018
From July 24th-26th, Fortinet will be attending Google Next 2018, which is being held at the Moscone Center in San Francisco. Come hear us speak on securing the digital transformation, multi-cloud...
High SSL Performance Earns FortiGate 5th Consecutive “Recommended” Rating in Latest NSS Labs NGFW Test Results
While NGFW solutions continue to be the linchpin security technology for the network, in today’s cloud and SSL-centric business environments not all NGFW solutions are created equal.
Join Fortinet at the 2018 AWS New York and Chicago Summits
Fortinet is joining other cloud-computing experts at the AWS New York and Chicago Summits. Join us to learn more about the rise of cloud adoption for enterprises, and the modern cybersecurity...
Executive Insights: Growing Up Tech
Michael Xie, Founder, President and CTO of Fortinet shares some pointers on how to raise a tech business successfully.
GandCrab v4.1 Ransomware and the Speculated SMB Exploit Spreader
Only two days after the release of GandCrab 4.0, FortiGuard Labs found a newer version (v4.1) being distributed using the same method, which is through compromised websites disguised as download...
Helping Facilitate Partner Success with NSE 8 Certification
The modern threat landscape is complex. Today, customers require equally complex security solutions to maintain an effective security posture. By completing Fortinet’s NSE 8 certification,...
Is Wireless Technology Secure?
While we all take wireless access for granted, are we aware of the security risks when using it?
Winning the Cyber Arms Race with Machine Learning
A machine learning-based approach to threat detection is set to revolutionize the security industry.
GandCrab V4.0 Analysis: New Shell, Same Old Menace
It has been over two months since GandCrab has undergone a major update. While this latest version includes an overhaul in terms of the code structure, its major purposes are practically the same.
Overcoming Multi-cloud Security Challenges in Education
Here are five best practices for keeping things safe when you have applications and data spread across multiple clouds.
Hussarini – Targeted Cyber Attack in the Philippines
FortiGuard Labs spotted a malicious document with the politically themed file name “Draft PH-US Dialogue on Cyber Security.doc”. This document takes advantage of the vulnerability CVE-2017-11882....
Easy Hosting Control Panel: SQL Injection & Multiple XSS Vulnerabilities
As part of our ongoing threat research at FortiGuard Labs, we discovered that EHCP contains an SQL Injection and multiple cross-site Scripting (XSS) vulnerabilities.
Executive Insights: The Global Security Risks of a Post-Quantum World
For anyone tasked with securing critical infrastructure the arrival and power of quantum computing might be keeping them up at night.
The Risks Mobile Payments Present to Financial Services
Consumers are rapidly adopting mobile payments and are expecting banks and financial services firms to ensure their security. As a result, financial services organizations must increase their...
Why Network and Security Operations Centers Should be Doing More
In today’s complex ecosystem of hyperconnected digital networks, NOC-only or SOC-only techniques are insufficient.
Identifying Security Priorities to Address New Healthcare Cyber Threats
The healthcare sector continues to be a target for cybercriminals as their capabilities become increasingly rapid, sophisticated, and resilient. To combat this healthcare organizations need to...
Recent Security Research News
This blog post is a summary of some recent research work that caught my attention in May 2018.
An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946)
Microsoft fixed an use-after-free bug in the Edge Chakra Engine in the May 2018 Patch. This bug (CVE-2018-0946) causes the Chakra Engine to access a freed function address that can possibly be...
Security Strategies that Federal Agencies Can Employ to Enable Digital Transformation