Threat Research

An Analysis of Microsoft Edge Chakra JavascriptArray TypeId Handling Memory Corruption (CVE-2018-8467)

FortiGuard Labs looks deeply into the Microsoft Edge Chakra Engine assembly codes to expose the root cause of this vulnerability and figures out the common exploits used by this kind of ‘Type Confusion’.

By Dehui YinOctober 19, 2018

Using Location Analytics to Improve Your Business

Solutions such as Fortinet’s FortiPresence, built directly into all of Fortinet’s wireless management solutions – including FortiGate, FortiCloud, and FortiWLM – provide location analytics information in an easy-to-use and deploy web-based solution for easy data collection and analysis.

By Chris HinszOctober 18, 2018

Industry Trends

The Need for Fast and Accurate Threat Intelligence

For your customers, identifying and quickly securing against modern cyberthreats is paramount—especially as they adopt digital transformation strategies to better meet the needs of their consumers. Unfortunately, cybercriminals are also moving at an increasingly rapid pace by continually innovating and evolving to exploit new attack vectors.

By Jeannette JarvisOctober 17, 2018

Industry Trends

Securing the Multi-Cloud: 3 Steps for Maintaining Control and Visibility

Securing today's complex and continually shifting IT infrastructures requires a meshed security framework that allows all security functions to communicate, collaborate, and coordinate between themselves using common semantics and syntax regardless of where they are deployed, as well as offering a framework that supports the automation of each and every security operation.

By Lior CohenOctober 16, 2018

Industry Trends

Recognizing and Preventing Modern Cyber Scams

As more and more devices are incorporated into a network, the risk of falling victim to modern cyber scams increases. Learn about the scams targeting your devices, as well as the indicators that can help you identify and avoid them.

By Ladi AdefalaOctober 15, 2018

Threat Research

Fortinet Discovers New Android Apps that Mine the Unminable

Cryptocurrencies don't all work the same way. Some are minable, some aren't. For example, Ripple (XRP), Cardano (ADA) and Tether (USDT) aren't minable.

By Axelle ApvrilleOctober 11, 2018

Business and Technology

Financial, Healthcare, Government, and Retail IT Professionals Review Fortinet’s Enterprise Firewall Solution

Fortinet has been named a Leader in a Gartner Magic Quadrant. Fortinet’s Enterprise Firewall solution has been reviewed on Gartner Peer Insights. Learn more about the capabilities included in this solution and read what professionals in the healthcare, financial services, government, and retail spaces have to say about the security it provides.

By FortinetOctober 11, 2018

Industry Trends

Why Education and Training are Essential for Closing the Cybersecurity Skills Gap

Trained and experienced cybersecurity professionals are increasingly difficult to hire. To close this skills gap, organizations must change their approach to education and training. Learn how organizations can be proactive in bringing new cybersecurity professionals up to speed.

By Scott EdwardsOctober 09, 2018

Threat Research

Bindweed: Digging Down to a Root of a Hidden Phishing Network

In one of our previous investigations into attacks on the service centers, FortiGuard Labs ran across a list of domains used by the criminals. During our subsequent monitoring process, we spotted a phishing HTML page on one of those webservers that was posing as a Dropbox login page.

Business and Technology

Fortinet Again Recognized by Gartner as an Enterprise Firewall Magic Quadrant Leader

In addition to having again been recognized by Gartner as an Enterprise Firewall MQ leader, we believe Fortinet is also the most certified security vendor in the industry.

By Nirav ShahOctober 08, 2018