Results for cybersecurity

Business and Technology

How the Fortinet Veterans Program is Helping to Bridge the Cybersecurity Skills Gap

The Fortinet FortiVet program is working to bridge the gap between the supply of veterans looking for post-service work and the need for qualified professionals across the cybersecurity industry.

By Stephan TallentMay 15, 2018

Threat Research

Analysis of New Agent Tesla Spyware Variant

Recently, FortiGuard Labs captured a new malware sample that was spread via Microsoft Word documents. After some quick research, I discovered that this was a new variant of the Agent Tesla spyware. I analyzed another sample of this spyware last June and published a blog about it. In this blog, I want to share what’s new in this new variant.

By Xiaopeng ZhangApril 05, 2018

Business and Technology

Fortinet’s FortiDDoS Supports BGP Flowspec

Fortinet is proud to announce that BGP Flowspec has now been incorporated into FortiDDoS This new functionality enables Service Providers to provide an effective solution to customers when a DDoS attack saturates their Internet links. Flowspec automates the coordination of traffic filtering by providing service providers with information that identifies specific packets to be dropped during a flood. Such a hybrid solution, combining a cost-effective FortiDDoS at the customer premises providing the first level of mitigation, with and a cloud-based scrubbing center providing volumetric attack mitigation, provides important benefits to customers impacted by these sorts of attacks.

By Hemant JainApril 04, 2018

Threat Research

FortiGuard Labs Discovers Vulnerability in D-Link Router DIR868L

In August of 2017, FortiGuard Labs discovered a pre-authenticated remote code execution vulnerability on D-Link router DIR868L. This vulnerability is specific to a local ISP’s customized firmware.

By Tony LoiMarch 30, 2018

Industry Trends

Mitigating Personal Cyber Risk

The biggest security challenge facing individuals and businesses today isn’t scale. It’s hyperconnectivity. The various devices and applications being used in homes or at organizations have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information from any device with a Wi-Fi connection or data plan, and IT consumerization encourages those same users to download new applications and storage solutions to use and share across a wide variety of devices.

By Anthony GiandomenicoMarch 29, 2018

Industry Trends

You Can’t Protect What You Can’t See

How many of us would hire a home security company that sent a representative to our house to tell us to remove all our lightbulbs so that it was pitch black inside? Sure, it would make it much more difficult for the burglars to find their way around. But with no way to turn the lights on, it would also be almost impossible to find the intruders—or determine whether there had been a break-in at all.

By Phil QuadeMarch 26, 2018

Threat Research

FortiGuard Labs Discovers Multiple Use-After-Free Vulnerabilities in Microsoft Word

During the last few months, FortiGuard Labs discovered and reported multiple use-after-free (UAF) vulnerabilities found in different versions of Microsoft Word. These vulnerabilities were patched in the January and March security updates, respectively. These patches are rated as critical/important, and as always, we urge users update Microsoft Office as soon as possible.

By Wayne Chin Yick LowMarch 22, 2018

Industry Trends

Combatting the Transformation of Cybercrime

The volume of cyberattacks is growing at an unprecedented rate, increasing as much as nearly 80% for some organizations during the final quarter of 2017. One reason for this acceleration in the attack cycle is that in order for malware to succeed today it needs to spread further and faster than even before. This allows cybercriminals to stay a step ahead of new efforts by vendors to improve their delivery of updated signatures and patches.

By John MaddisonMarch 20, 2018

Business and Technology

IoT Exploit Activity has Quadrupled - Are You Prepared?

The evolution of malware is being fueled largely by the proliferation of IoT. According to Gartner data, there were about 8 billion connected “things” in 2017. But that number is expected to nearly triple to more than 20 billion in just the next two years, which averages out to roughly three connected devices per person on Earth. Simply put, the opportunity for cybercriminals to enter networks and steal data or hold segments (or the entirety) of the network hostage is growing at an exponential rate, with no signs of slowing down.

By Anthony GiandomenicoMarch 19, 2018

Industry Trends

Securing the Federal Hybrid Cloud

Federal agencies are under pressure to make a timely, secure shift to the cloud with minimal disruption. For many, however, this is easier said than done. With a wide array of data that falls under a variety of privacy and protection regulations, "how?" is a complicated question.

By Bob FortnaMarch 16, 2018