Zero Day Risks and the Return of Hacking Team

April 24, 2018

There are basically two kinds of threats organizations and users face today: the ones that security vendors and threat researchers know about, and those they don’t. The ones we know about get vendor patches, signatures are updated across a variety of security tools in order to detect them, and behaviors are documented in order to detect and disrupt the more sophisticated ones. People who are affected by these sorts of attacks usually either don’t have the right security tools deployed in the right places, or they aren’t practicing adequate cyber hygiene.

Read more...

Previous Article
Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner
Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner

Recently, FortiGuard Labs uncovered a new python-based cryptocurrency mining malware that uses the ETERNALR...

Next Article
New Trickbot Plugin Harvests Email Addresses from SQL Servers, ScreenLocker Module Not for Ransom
New Trickbot Plugin Harvests Email Addresses from SQL Servers, ScreenLocker Module Not for Ransom

Just a week after publishing our discovery of Trickbot’s networkDLL, the FortiGuard Labs monitoring system ...