Results for sandbox

Business and Technology

Closing the Sandbox Generation Gap

Changing times call for evolved security. 7 reasons why next-generation sandboxing is a requisite.

By Damien LimMay 24, 2018

Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation

In this blog post, we will discuss the history of sandbox detection. We will then unveil the malware families that KTIS has observed from spear-phishing emails that attempt to bypass the user-mode API hook in order to evade sandbox detection. And finally, we will share the mitigation method we use to harden the Cuckoo sandbox against this bypass technique.

By Floser Bacurio and Wayne LowJanuary 03, 2018

Business and Technology

FortiSandbox 2000E Earns Coveted NSS Recommended in Latest Breach Detection System Public Test

Fortinet participated in the NSS Labs 2017 Breach Detection System (BDS) group test and was awarded a Recommended rating for its latest FortiSandbox 2000E appliance introduced in the second half of 2017.

By Damien LimNovember 01, 2017

Threat Research

Security Research News in Brief - April 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. Previous edition: March 2017 What happened to your home? IoT Hacking and Forensic with 0-day from TROOPERS 17, by Park and Jin Figure 1: Hacking a vacuum cleaner The authors hacked a vacuum cleaner, which, besides cleaning, also includes an embedded camera and microphone. The hack wasn’t easy because the vacuum wasn’t too badly secured. The authors however found 2 vectors: 1. They connected on the...

By Axelle ApvrilleMay 10, 2017

Partners

Q&A on Using a Real Time Sandbox to Thwart Packed Malware

There have been numerous cases where advanced malware has been linked to significant data breaches. Malware authors employ a variety of techniques to hide their malicious intent, including the use of packing utilities to create “packed malware.” Ladi Adefala, Senior Security Strategist at Fortinet, explains how a real time sandbox can change the game with regard to defending against these sophisticated attacks. What is Packed Malware? Packed malware is one of the most common types of advanced malware, carefully designed to evade...

By Ladi AdefalaDecember 07, 2016

Industry Trends

Fortinet Fabric Ready Program- More Open than Ever

On September 26th, Fortinet announced our new Fortinet Fabric Ready Program, which delivers on the “Open” attribute of the Fortinet Security Fabric by providing threat intelligence visibility across multi-vendor cybersecurity solutions. Cross-product  coordination (regardless of vendor) is a critical capability for today’s enterprises, as it is rare for an organization to completely source all IT security components from a single vendor across the entirety of their network and covering all attack vectors.  Leaving...

By David FingerOctober 18, 2016

Industry Trends

Securing The Internet of Things – Industrial Control Systems

The Internet of Things (networks of uniquely identifiable endpoints, or "things," that communicate without human interaction using embedded IP connectivity) is the next industrial revolution. Estimates say there will be 24 Billion IoT devices installed by 2020, and $6 Trillion will be invested in IoT devices over the next 5 years. With that kind of growth and investment, protecting each of these “things” and their corresponding interactions with other components, including our networks, will be critical. So where is this...

By Daniel ColeSeptember 14, 2016

Industry Trends

Q&A: Today’s Cyber Threat Landscape – 3rd Party Testing and Sandboxes

Sandbox technology and the ongoing effort to defend and protect against cyber threats continues. Independent testing offers organizations valuable insight into what solutions are best for their use case. Below we discuss this maturing technology and the role of testing with Fortinet’s David Finger. I saw the announcement from NSS Labs about their recent Breach Detection Group Test results. What is the significance? Cyberattacks and breaches continue to be top of mind across organizations, and because of that, sandbox technology (or Breach...

By Bill McGeeAugust 02, 2016

Industry Trends

A Tale of Shifu and its Attempt to Bypass FortiSandbox

Overview Over the last few months, the Shifu banking Trojan has become more common in the wild prevalent and the malware family has been getting a fair amount of attention both from researchers and the mainstream media. there have been a number of discussions surrounding the malware family. We also became aware that this malware attempts to bypass our sandbox technology, FortiSandbox. In this post, we will share some of our findings on this new banking Trojan and also talk about how our technologies can support and address Shifu. Prevalence While...

By Floser BacurioNovember 03, 2015