As a member of the Cyber Threat Alliance (CTA), FortiGuard Labs received critical information and additional findings showing the VPNFilter campaign is targeting significantly more devices than initially thought, and contains additional capabilities, including the ability to deliver exploits to endpoints.
New Threats, Old Threats - A Deeper Look
IT security teams stand a much better chance of defeating the latest cyber schemes when they know what to l...
Most Recent Articles
The Importance of Real-Time Threat Intelligence to Combat Today's Looming Threats
Our recent threat landscape report shows that popular attack vectors are becoming more distributed. Learn why having real-time threat intelligence is integral to staying a step ahead of cyberattacks.
SCADA/ICS Dangers & Cybersecurity Strategies
Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer.
Threat Landscape Report: Virtually No Firm is Immune from Severe Exploits
Highlights from the latest Fortinet Threat Landscape Report, a valuable resource for any organization looking to stay ahead of today’s latest threat challenges.
Fortinet Secure SD-WAN Gives the Performance of a Lifetime, Recommended by NSS Labs
Fortinet is the only vendor with security capabilities to receive SD-WAN Recommended Rating in the first NSS Labs Software-Defined Wide Area Networking Test Report.
Fortinet and IBM Sign Cyber Threat Information Sharing Agreement
Fortinet and IBM Security have now announced that they will actively share cyber threat information.
Addressing the Growth of SSL-Encrypted Traffic Volume with FortiGate’s NGFW
Today, businesses and organizations are relying more on SSL-encrypted traffic than ever before. Learn how Fortinet’s NGFW secures SSL traffic without compromising on overall firewall performance.
Tool Showcase at Black Hat USA 2018 - FortiAppMonitor
Fortinet researcher Kai Lu will present and showcase an application behavior monitoring tool for researchers named FortiAppMonitor for macOS.
An Analysis of the DLL Address Leaking Trick used by the “Double Kill” Internet Explorer Zero-Day exploit (CVE-2018-8174)
“Double Kill” is an Internet Explorer(IE) Zero-Day exploit which was discovered in the wild and fixed in the Microsoft May Patch. It exploits a use-after-free vulnerability of vbscript.dll to...
Separating The Wheat From The Chaff
The results are in, and Fortinet clearly provides best-in-class security effectiveness, performance, and TCO. And not just this year. This is our 5th consecutive year of having a “Recommended”...
Fortinet Announces Enhancements to Our Security Services Portfolio
Fortinet's threat intelligence security subscriptions ensure that your Fortinet security solutions are tuned continuously with up-to-the-minute insight into threats occurring anywhere in the world...
Critical SamSam Ransomware Update
An overview of how to defend your organization from SamSam and other ransomware.
Join Fortinet at Black Hat USA 2018 in Las Vegas
Join us in Las Vegas
Service Provider Security in an Era of Software Defined Anything
Change is a constant in the worlds of service providers. But it gets more interesting when we look at what’s changing, why, and what it means to service provider operations and their customers.
Best Practices for Defeating Automated Attacks
A system of integrated, orchestrated security solutions enables organizations to fight automation with automation, using cybercriminals’ own tactics to turn the tables on them and shorten the time...
Malvertising, Input Validation, and New IoT Botnet Variants
What do malvertising, input validation, and new IoT botnet variants have in common? Well, they’re all part of our Weekly Threat Intelligence Brief.
Security Implications of Digital Transformation Report
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from a lens of digital transformation and the...
Debugging PostScript with Ghostscript
PostScript is a simple interpretive programming language with powerful graphics capabilities that has been integrated into most of today’s modern printers. Over the last couple of years, the...
IcedID & Trickbot: A Give-and-Take Relationship
FortiGuard Labs recently caught one of Trickbot’s C2 (Command and Control) servers sending commands to its victims that instructed its bots to download what turned out to be an updated variant of...
Not All Cloud Software is Created Equal
Not all cloud security solutions are the same. Careful analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your...
Fortinet Expands Security Fabric Offerings on Google Cloud Platform