Wikipedia defines steganography as “the practice of concealing a file, message, image, or video within another file, message, image, or video.” At this point, security professionals will immediately recognize the potential for steganography to act as vehicle for surreptitiously delivering malicious code into systems targeted for cybersecurity exploit, and subsequently exfiltrating purloined data from compromised devices. Given the ingenuity of the adversary community, it will be no surprise that the frequency of steganographically-based attacks has increased over the last couple of years.
In preparation for our talk entitled “IoT: Battle of Bots” at the RootedCon Security conference that will be held in Madrid, Spain this March 2018, the FortiGuard Labs team encountered yet another new Mirai variant.
The Mobile Security and Managed Security Services Zone area that we’re setting in up in our booth at this year’s Mobile World Congress (MWC) places Fortinet at the center of one of the most innovation-intensive sectors of Communication Service Providers (CSPs). The dawning era of 5G is about much more than speeds and availability.
At the beginning of February 2018, FortiGuard Labs collected a malicious email with the subject “UPS DELIVERY UPDATE”, as shown in Figure 1. Phishers and scammers traditionally misuse the names of well-known organizations and individuals in order to make their malicious messages seem legitimate, allowing them to more easily trick unsuspecting victims. This email message contains a fake order tracking number with a bogus hyperlink that, rather than connecting the user to a legitimate website, downloads a jar malware. After a quick analysis, I was able to determine that this malware is jRAT/Adwind.
Organizations are becoming increasingly reliant on digital capabilities across industries, and this is no different in the healthcare space. New technology has enabled patients to take a more hands-on role in their care, simplified patient/physician communication, and improved the ability of patients to get care in rural locations. For this adoption of technology to be effective, however, healthcare providers must ensure they have the necessary WAN (wide area network) infrastructure to accommodate more requests and greater bandwidth needs.
As the education space undergoes digital transformation, the IoT and artificial intelligence bring new risks and opportunities. Learn how schools can protect their networks while adopting new technology.
Third party testing of security products and solutions plays a critical role in thwarting cybercriminals. The reason is simple: organizations need effective security solutions that meet an evolving set of requirements, and far too many security vendors don’t do a very good job of providing data that enables a fair comparison between competing solutions. It’s like comparison-shopping at the grocery store. Items next to each other appear similar at a glance, but when you look closely at the labels you find that one is priced per ounce, while the next is labeled with price per unit. Another calls itself “healthy,” yet contains too many grams of fat.
It’s been said that a rising tide lifts all boats. It turns out, however, that it doesn’t lift them all at the same time. Boats way in the back of the harbor, a little higher up on the shore, tend to have to wait a bit longer for the tide to reach them. In networking terms, those boats are just a bit beyond the reach of the first waves of the incoming tide of digital transformation. While networks have been in transition for the past few years, traditional connectivity comes with its own set of obstacles. Mainly because it has historically...
Fortinet is a sponsor of the 2018 Microsoft Tech Summit, a traveling seminar and exhibition series in Europe
Fortinet’s booth presence and education efforts at Mobile World Congress reinforce that commitment by exploring three themes: Agile Security for Mobile Cloud Services Delivery, Advanced Security for Industrial Operation Technology (OT) and the Internet of Things (IoT), and Mobile Security/Managed Security Services.