Results for cybercrime

Business and Technology

How Modernization Drives Cybercrime

Government IT modernization requires a distributed network that incorporates IoT devices, cloud infrastructure, and SaaS applications. Unfortunately, distributed networks also mean a larger attack surface for cybercriminals to exploit.

By FortinetFebruary 27, 2019

Industry Trends

Cybercriminals and the Holidays

Cybercriminals are determined and informed on the latest trends and how to exploit them. Which is why we need to take the time to educate ourselves - and our friends and family – about shopping carefully so we can have a happy, and safe Holiday season.

By Aamir LakhaniNovember 19, 2018

Threat Research

DDoS-for-Hire Service Powered by Bushido Botnet

The FortiGuard Labs team recently discovered a new platform offering DDoS-for-hire service called “0x-booter.” First appearing on October 17, 2018, 0x-booter is available to anyone who signs up on the website. As shown in the following figures, this service comes with an explicitly defined user interface which enables practically anyone to learn and use the service.

By Rommel Joven and Evgeny AnaninOctober 26, 2018

Industry Trends

Painting a New Security Landscape

Hackers are thinking more like developers to evade detection and are becoming more precise in their targeting.

By Derek MankySeptember 12, 2018

Business and Technology

Join Fortinet at Black Hat USA 2018 in Las Vegas

Fortinet is proudly attending the 22nd annual Black Hat USA Information Security Event as a Platinum Plus Sponsor.

By FortinetJuly 30, 2018

Threat Research

IcedID & Trickbot: A Give-and-Take Relationship

FortiGuard Labs recently caught one of Trickbot’s C2 (Command and Control) servers sending commands to its victims that instructed its bots to download what turned out to be an updated variant of the IcedID banking Trojan.

By Floser Bacurio Jr.July 25, 2018

Threat Research

You Will Fall For This One Day...

A couple of days ago, a friend of mine, James, was the victim of a scam and gave away his credit card number and CVC. The interesting part is that he is not the "standard" victim, but a very security aware person: he's a researcher on the security of embedded systems, a CTF player, and he cares for his privacy. Nevertheless, he fell into the trap of a phishing scam, and the story tends to prove that we will all likely fall for one of these one day. The only difference between James and the ordinary online shopper is that, the next day, he was uneasy with the situation and decided to investigate more.

By Axelle ApvrilleApril 09, 2018

Business and Technology | Industry Trends

Executive Insights: Winning the Digital Transformation Cyberwar

The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end users, break through inadequate security systems, and infect people wandering around the web in places they probably shouldn’t go.

By Jonathan Nguyen-DuyFebruary 15, 2018

Industry Trends

Securing the Next Generation of Digital Transformation

Cybercrime is a continually increasing problem due to the digital transformation-driven expansion of the attack surface and the growing sophistication of bad actors. Corporations and government agencies of all sizes are rapidly adopting digital business models that allow them to rapidly respond to evolving consumer demands, process transactions, and react to real time intelligence - generating greater agility, productivity for better business outcomes, and improved quality of life. But this transformation goes far beyond the corporate world. Digital transformation is changing society at an unprecedented scale. It is fundamentally changing how we learn, work, socialize, shop, manage finances, and interact with the world around us. And things like artificial intelligence and augmented reality, still in their infancy, are going to accelerate the rate of change even further.

By Jonathan Nguyen-DuyFebruary 13, 2018

Industry Trends

Nine Top Priority Cybersecurity Threats Active in the Education Sector Today – and Why Everyone Should Care

Educational institution networks continue to be a favorite playground for cybercriminals. Because of the age and interests of the majority of educational users, these networks tend to incorporate cutting edge technologies and strategies.

By Anthony GiandomenicoJanuary 31, 2018