Business and Technology | Threat Research

Cyber Threat Alliance Members Issue First Collaborative Report on Cryptomining

The CTA has just released a new report on the growing threat of cryptomining, an activity that poses both short and long-term threats to individuals and enterprises. This report lays out the risk, its potential impacts, and the best practices organizations can employ to counter this rising menace.

By Anthony GiandomenicoSeptember 19, 2018

Threat Research

Beware of Emails Purporting to be from the IRS

FortiGuard Labs has come across a peculiar phishing campaign purporting to be from the United States Internal Revenue Service (IRS), which is titled “2018 UPDATE: NON RESIDENT ALIEN TAX WITHHOLDING.

By FortiGuard SE TeamSeptember 17, 2018

Business and Technology

Fortinet Brings the Industry’s Broadest Security Portfolio to Microsoft Ignite 2018

As a global leader in providing broad, integrated, and automated cybersecurity solutions, Fortinet is again participating as a Gold Sponsor at Microsoft Ignite.

By FortinetSeptember 17, 2018

Threat Research

Results from the Third Annual “ETSI NFV Plugtest + OPNFV SFC/NSH” Event

For three years now, ETSI has conducted an NFV (Network Functions Virtualization) Plugtest event that provides an opportunity for vendors and open source communities to meet, collaborate, and assess the level of interoperability of their implementations and solutions, especially in multi-vendor environments.

By Nicolas ThomasSeptember 14, 2018

Threat Research

Microsoft JET Database Engine Code Execution Vulnerability

FortiGuard Labs discovered a code execution vulnerability in the Windows JET Database Engine and reported it to Microsoft using the responsible disclosure process. On the patch Tuesday of September 2018, Microsoft released a Security Advisory that contains the fix for this vulnerability, identifying it as CVE-2018-8392.

By Honggang RenSeptember 14, 2018


Security Services Enable Partners to Help Plug the Holes in Customer Networks

Today's attacks are designed to exploit vulnerabilities and dive deep into the network without leaving a trace. This enables lateral movement, in which bad actors search for resources to take over or data to exploit, all without detection.

By Jon BoveSeptember 13, 2018

Industry Trends | Threat Research

Painting a New Security Landscape

Hackers are thinking more like developers to evade detection and are becoming more precise in their targeting.

By Derek MankySeptember 12, 2018

Industry Trends

Today’s CISO is Shifting Toward Strategic Business Enablement

Today’s CISO responsibilities are shifting toward business enablement and digital transformation. Learn how CISOs can successfully adapt to these changes without compromising security posture.

By Jonathan Nguyen-DuySeptember 11, 2018

Business and Technology

Choosing a WAF Solution? Third-Party Evaluations can Help

In Gartner’s latest Magic Quadrant for Web Application Firewall MQ report for 2018, Fortinet has been placed in the Challenger quadrant, while also showing continued movement in ability to execute, closer to the Leader quadrant.

By FortinetSeptember 10, 2018

Cryptojacking and the Home

Cryptojacking has become a growing concern. Cybercriminals aren’t satisfied with the available supply of vulnerable servers and PCs to hijack in order to mine their favorite cryptocurrency. So, they have added another rich source of computational horsepower to their arsenal: IoT devices.

By Anthony GiandomenicoSeptember 07, 2018