Threat Research

Thrip ATP Attack Update

In conjunction with the Cyber Threat Alliance, Symantec today released their blog post on an APT (advanced persistent threat) group codenamed "Thrip.” As part of our membership with the Cyber Threat Alliance (CTA), we have received these indicators ahead of publication to ensure that FortiGuard customers are protected from this latest disclosure.

By FortiGuard SE TeamJune 19, 2018

Business and Technology | Partners

Together, Fortinet and AWS Secure the Government

Fortinet’s Security Fabric cloud solutions are available to AWS enterprise, service provider, and public sector customers, providing comprehensive security, threat intelligence, and visibility to detect, isolate, and respond to threats in real time.

By FortinetJune 19, 2018

Partners

Going Beyond Compliance

Organizations that go beyond compliance to offer robust data-security controls provide greater value to consumers and build their level of trust, resulting in a distinct competitive edge.

By Jon BoveJune 19, 2018

Industry Trends

Defending Against an Automated Attack Chain: Are You Ready?

Threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

By Derek MankyJune 18, 2018

Industry Trends

AI Doesn’t Eliminate Jobs, It Creates Them

Automation and AI are not eliminating jobs, they are creating them — high-paying, high-level and secure ones at that — at an unprecedented rate. As the levels of data continue to grow, that will create even greater demand.

By Michael XieJune 15, 2018

Industry Trends

The Rise of Destructive Botnets

It is critical that every organization become aware of these emerging risks and begin to take appropriate countermeasures now. In the escalating cyberwar, enterprises need to be able to fight automation with automation.

By Anthony GiandomenicoJune 14, 2018

Threat Research

Microsoft Windows Remote Kernel Crash Vulnerability

At the end of January 2018, the FortiGuard Labs team discovered a remote kernel crash vulnerability in Microsoft Windows and reported it to Microsoft by following Fortinet’s responsible disclosure process. On June 12, Microsoft released an advisory that contains the fix for this vulnerability and identifies it as CVE-2018-1040.

By Honggang RenJune 14, 2018

Business and Technology

Two Options for Evolving Your IPS Solution

Every moment of every day an IPS system works to detect malicious content in network traffic to prevent attacks and exploits for organizations of all sizes. But as the digital infrastructure changes the traditional IPS market is being forced to evolve.

By Nat SmithJune 13, 2018

Business and Technology

Threat Information Sharing Goes Far Beyond Simply Protecting Businesses

As the digital and physical worlds become more interconnected, threat intelligence sharing is becoming an increasingly critical component of any security strategy.

By Derek MankyJune 13, 2018

Threat Research

PyRoMineIoT: NSA Exploit, Monero(XMR) Miner, & IoT Device Scanner

In this article, we will discuss the changes made to PyRoMine, as well as how the ETERNALROMANCE exploit was used to distribute yet another Monero miner we have dubbed PyRoMineIoT.

By Jasper ManuelJune 12, 2018