Results for threat intelligence

Industry Trends

Critical Strategies for Staying Ahead of Emerging Cyberthreats

Organizations must make radical changes in order to fill security gaps that are becoming increasingly more common as networks become more complex. Learn more about the vital strategies that can help you stay ahead of cyberthreats.

By John MaddisonJune 03, 2019

Industry Trends

Threat Intelligence and the Evolving Threat Landscape

As organizations continue to adopt and drive digital transformation (DX), staying ahead of the threat landscape and attack chain curves is becoming increasingly difficult to achieve. Learn more about the challenges and opportunities of DX, and the importance of threat intelligence to protect your network from the latest threats.

By Anthony GiandomenicoMay 31, 2019

Threat Research

New Rocke Variant Ready to Box Any Mining Challengers

FortiGuard Labs has been monitoring a Linux coin mining campaign from “Rocke” – a malware threat group specializing in cryptomining. Learn more about the general behavior of the malware as well as new features we have documented.

By Joie SalvioMay 28, 2019

Threat Research

Key Takeaways from Our Latest Global Threat Landscape Report

Fortinet announced the findings of the latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to utilizing pre-installed tools or established infrastructure to maximize efficiency for their opportunities.

By FortiGuard SE TeamMay 21, 2019

Threat Research

Predator the Thief: New Routes of Delivery

FortiGuard Labs discovered a running campaign against Russian-speakers using a new version of “Predator the Thief” stealer malware. The same actor was using one set of dummy files to deliver the stealer via different forms of phishing, including Zipped files, fake documents, fake pdfs, and the WinRAR exploit described in CVE-2018-20250.

Threat Research

Looking Into Anatova Ransomware

Anatova is a fairly new ransomware. It avoids infecting computers that are used in analysis and research labs. It systematically avoids infecting files and folders that are important to the stability of the computer system it is infecting.

By Raul AlvarezApril 11, 2019

Threat Research

LockerGoga: Ransomware Targeting Critical Infrastructure

LockerGoga is not at all exceptional in terms of sophistication, especially when compared to other ransomware families. However, it has a unique way of iterating through the files of the victim.

Threat Research

RPC Bug Hunting Case Studies – Part 2

In this final installment of the blog post series, we will show you our alternative approach to narrowing down the RPC services that should be looked into in the effort of finding local privilege escalation. This approach has proven to be quite effective so far, as we ended up finding similar vulnerabilities but in different components.

By Wayne Chin Yick Low April 02, 2019

Industry Trends

AI-based Fuzzing Could Change Security

Once the purview of defense researchers, advanced fuzzing is poised to fall into the hands of the criminal community. AI-powered fuzzing will change the game for both attacker and target. One effective method of counter-attack is to go after the underlying economic strategies of criminal organizations.

By Derek MankyMarch 25, 2019

Partners

The Need for Threat Intelligence in SMB Cybersecurity

For some time now, SMBs have assumed cybercriminals won’t consider them a viable target due to their size. Unfortunately, this isn’t the case. SMBs still provide plenty of incentive to entice cybercriminals to target their networks, thanks to the unique security challenges they face.

By Jon BoveMarch 13, 2019