Organizations must make radical changes in order to fill security gaps that are becoming increasingly more common as networks become more complex. Learn more about the vital strategies that can help you stay ahead of cyberthreats.
As organizations continue to adopt and drive digital transformation (DX), staying ahead of the threat landscape and attack chain curves is becoming increasingly difficult to achieve. Learn more about the challenges and opportunities of DX, and the importance of threat intelligence to protect your network from the latest threats.
FortiGuard Labs has been monitoring a Linux coin mining campaign from “Rocke” – a malware threat group specializing in cryptomining. Learn more about the general behavior of the malware as well as new features we have documented.
Fortinet announced the findings of the latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to utilizing pre-installed tools or established infrastructure to maximize efficiency for their opportunities.
FortiGuard Labs discovered a running campaign against Russian-speakers using a new version of “Predator the Thief” stealer malware. The same actor was using one set of dummy files to deliver the stealer via different forms of phishing, including Zipped files, fake documents, fake pdfs, and the WinRAR exploit described in CVE-2018-20250.
LockerGoga is not at all exceptional in terms of sophistication, especially when compared to other ransomware families. However, it has a unique way of iterating through the files of the victim.
In this final installment of the blog post series, we will show you our alternative approach to narrowing down the RPC services that should be looked into in the effort of finding local privilege escalation. This approach has proven to be quite effective so far, as we ended up finding similar vulnerabilities but in different components.
Once the purview of defense researchers, advanced fuzzing is poised to fall into the hands of the criminal community. AI-powered fuzzing will change the game for both attacker and target. One effective method of counter-attack is to go after the underlying economic strategies of criminal organizations.
For some time now, SMBs have assumed cybercriminals won’t consider them a viable target due to their size. Unfortunately, this isn’t the case. SMBs still provide plenty of incentive to entice cybercriminals to target their networks, thanks to the unique security challenges they face.