Business and Technology

IoT Exploit Activity has Quadrupled - Are You Prepared?

The evolution of malware is being fueled largely by the proliferation of IoT. According to Gartner data, there were about 8 billion connected “things” in 2017. But that number is expected to nearly triple to more than 20 billion in just the next two years, which averages out to roughly three connected devices per person on Earth. Simply put, the opportunity for cybercriminals to enter networks and steal data or hold segments (or the entirety) of the network hostage is growing at an exponential rate, with no signs of slowing down.

By Anthony GiandomenicoMarch 19, 2018

Industry Trends

Securing the Federal Hybrid Cloud

Federal agencies are under pressure to make a timely, secure shift to the cloud with minimal disruption. For many, however, this is easier said than done. With a wide array of data that falls under a variety of privacy and protection regulations, "how?" is a complicated question.

By Bob FortnaMarch 16, 2018

Threat Research

Dreambot 2017 vs. ISFB 2013

We recently received a malware sample recently that had been packed and compiled on Tue Feb 06 2018. After unpacking it, we found that it contained a version of the Dreambot/Ursnif trojan, which had a compilation date of Tue Oct 10 2017, suggesting that existing versions of Dreambot are now being packaged with brand-new droppers.

By Jerome CruzMarch 16, 2018

Threat Research

Troopers - Day 2

This is the first conference where I have heard so much about hacking robots! Between yesterday and today, we've had: • Robotnikoff at Troopers: robots, security, and privacy - Brittany Postnikoff • Hacking Robots Before Skynet - Lucas Apa • Breaking the Laws of Robotics: Attacking Industrial Robots - Davide Quarta

By Axelle ApvrilleMarch 16, 2018

Threat Research

RootedCon Wrap Up

RootedCon is a security conference held from the 1st to the 3rd of March in Madrid, Spain. This year’s conference was the ninth iteration, and one could see the results of those years of experience in the flawless organization at the event.

By Dario DurandoMarch 16, 2018

Threat Research

GandCrab: Honor among Thieves?

GandCrab is the first ransomware to hit the spotlight this year. Known as the first ransom malware to use DASH cryptocurrency as a payment, it has hit more than 50,000 victims according to a report from Europol.

Business and Technology

Fortinet at HIMSS 2018: Troy Roberts Discusses the Healthcare Security Landscape

Watch the video in this post to hear from Fortinet’s Troy Roberts, VP of Enhanced Technologies, as he discusses the challenges facing healthcare organizations in 2018 and how to overcome them.

By Susan BiddleMarch 16, 2018

Business and Technology

Fortinet a Gold Sponsor at IBM Think 2018

Digital business is transforming how organizations and individuals communicate, operate, and interact. These changes not only hold the promise for new opportunities, but also bring new risks to data, economies, and resources. Which is why Fortinet is a Gold Sponsor at this year’s IBM Think 2018, being held March 19-22 at the Mandalay Bay in Las Vegas.

By FortinetMarch 15, 2018

Threat Research

Troopers - Day 1

I am currently at Troopers, a well-known German hacking conference in Heidelberg. I had heard many positive reports on about this conference, especially their awesome hardware badge, and am glad I finally got to speak there. My talk was on hacking a smart toothbrush, and why it's important to secure any connected device, even those - like toothbrushes - that seem harmless. If you missed my talk, my slides will soon be online:, check the Fortiguard Research Centre. Now, let's focus on some of today's talks.

By Axelle ApvrilleMarch 14, 2018

Industry Trends

Securing OT Networks Against Rising Attacks

Operational Technology (OT) networks play a critical role in manufacturing, defense, emergency services, food and agriculture, financial systems, and critical infrastructure, just to name a few. OT networks and devices include supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS). They might be deployed anywhere – inside an automated manufacturing floor, outside a chemical processing plant managing valves and switches, on a rig in the middle of the ocean, or out in the arctic monitoring oil and gas pipelines. OT systems often perform simple yet essential tasks, such as monitoring a valve and shutting it off when a certain value is triggered. As a result, they can perform their tasks with little change for years. Which also means they sometimes run on aging operating systems and obsolete hardware using home grown applications. Since the goal for an OT system is to run exactly as designed, even patches are only applied if they do not hinder the process of the OT system.

By Derek MankyMarch 13, 2018