Threat Research

Steganography: Combatting Threats Hiding in Plain Sight

Wikipedia defines steganography as “the practice of concealing a file, message, image, or video within another file, message, image, or video.” At this point, security professionals will immediately recognize the potential for steganography to act as vehicle for surreptitiously delivering malicious code into systems targeted for cybersecurity exploit, and subsequently exfiltrating purloined data from compromised devices. Given the ingenuity of the adversary community, it will be no surprise that the frequency of steganographically-based attacks has increased over the last couple of years.

By Jeannette JarvisFebruary 21, 2018

Threat Research

OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers

In preparation for our talk entitled “IoT: Battle of Bots” at the RootedCon Security conference that will be held in Madrid, Spain this March 2018, the FortiGuard Labs team encountered yet another new Mirai variant.

Business and Technology

Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress

The Mobile Security and Managed Security Services Zone area that we’re setting in up in our booth at this year’s Mobile World Congress (MWC) places Fortinet at the center of one of the most innovation-intensive sectors of Communication Service Providers (CSPs). The dawning era of 5G is about much more than speeds and availability.

By Ronen ShpirerFebruary 19, 2018

Threat Research

New jRAT/Adwind Variant Being Spread With Package Delivery Scam

At the beginning of February 2018, FortiGuard Labs collected a malicious email with the subject “UPS DELIVERY UPDATE”, as shown in Figure 1. Phishers and scammers traditionally misuse the names of well-known organizations and individuals in order to make their malicious messages seem legitimate, allowing them to more easily trick unsuspecting victims. This email message contains a fake order tracking number with a bogus hyperlink that, rather than connecting the user to a legitimate website, downloads a jar malware. After a quick analysis, I was able to determine that this malware is jRAT/Adwind.

By Xiaopeng ZhangFebruary 16, 2018

Business and Technology

Securing SD-WAN in Distributed Healthcare Environments

Organizations are becoming increasingly reliant on digital capabilities across industries, and this is no different in the healthcare space. New technology has enabled patients to take a more hands-on role in their care, simplified patient/physician communication, and improved the ability of patients to get care in rural locations. For this adoption of technology to be effective, however, healthcare providers must ensure they have the necessary WAN (wide area network) infrastructure to accommodate more requests and greater bandwidth needs.

By Nirav ShahFebruary 16, 2018

Business and Technology | Industry Trends

The Connected Campus: Digital Transformation in Education

As the education space undergoes digital transformation, the IoT and artificial intelligence bring new risks and opportunities. Learn how schools can protect their networks while adopting new technology.

By Sowjanya O'NeillFebruary 16, 2018

Business and Technology

Effectiveness, Performance, and Value: The Role of Third Party Security Testing

Third party testing of security products and solutions plays a critical role in thwarting cybercriminals. The reason is simple: organizations need effective security solutions that meet an evolving set of requirements, and far too many security vendors don’t do a very good job of providing data that enables a fair comparison between competing solutions. It’s like comparison-shopping at the grocery store. Items next to each other appear similar at a glance, but when you look closely at the labels you find that one is priced per ounce, while the next is labeled with price per unit. Another calls itself “healthy,” yet contains too many grams of fat.

By David FingerFebruary 15, 2018

Business and Technology

Using MSSPs to Secure SD-WAN

It’s been said that a rising tide lifts all boats. It turns out, however, that it doesn’t lift them all at the same time. Boats way in the back of the harbor, a little higher up on the shore, tend to have to wait a bit longer for the tide to reach them. In networking terms, those boats are just a bit beyond the reach of the first waves of the incoming tide of digital transformation. While networks have been in transition for the past few years, traditional connectivity comes with its own set of obstacles. Mainly because it has historically...

By Matthew PleyFebruary 14, 2018

Business and Technology

On the Road with the Microsoft Tech Summit In Europe

Fortinet is a sponsor of the 2018 Microsoft Tech Summit, a traveling seminar and exhibition series in Europe

By Ronen ShpirerFebruary 13, 2018

Business and Technology

Fortinet Covers Industrial Operation Technology and Internets of Things Security at Mobile World Congress

Fortinet’s booth presence and education efforts at Mobile World Congress reinforce that commitment by exploring three themes: Agile Security for Mobile Cloud Services Delivery, Advanced Security for Industrial Operation Technology (OT) and the Internet of Things (IoT), and Mobile Security/Managed Security Services.

By Ronen ShpirerFebruary 12, 2018