Results for phishing

Business and Technology

State of Email Security in 2020: More Spam, Malware, Phishing & Ransomware Ahead

Learn more about the state of email security in 2020, and discover how you can identify and protect against security risks in your environment with FortiMail and our Cyber Threat Assessment Program (CTAP) for email security.

By Jeff BrainardApril 07, 2020

Threat Research

Deep Analysis of New Metamorfo Variant Targeting Customers of Brazilian Financial Organizations

Read about a new variant of the Metamorfo malware targeting Brazilian financial organizations, in this analysis from FortiGuard Labs.

By Xiaopeng Zhang January 15, 2020

Threat Research

FortiGuard Labs Weekly Threat Update – November 1, 2019

Learn about the cyber threats uncovered during the week of November 1, 2019.

By Jeannette Jarvis November 01, 2019

Threat Research

FortiGuard Labs Weekly Threat Update – October 18, 2019

Learn about the cyber threats uncovered during the week of October 14, 2019.

By Jeannette Jarvis October 18, 2019

Threat Research

New NetWire RAT Variant Being Spread Via Phishing

FortiGuard Labs recently discovered a new NetWire RAT variant spreading via phishing email. Learn more about this malware.

By Xiaopeng ZhangSeptember 23, 2019

Threat Research

Tracking Down a Big Phish

Learn more about a recent phishing campaign uncovered by Fortinet's Web Filtering team.

By Raymond ChanAugust 29, 2019

Business and Technology

Top 3 Reasons Email Security Should Be Top of Mind for Everyone

Learn more about why organizations should keep email security top of mind as they migrate to cloud environments.

By David FingerJuly 10, 2019

Threat Research

Analysis of a New HawkEye Variant

FortiGuard Labs recently identified a new variant of HawkEye malware being spread by a phishing email. Read more about the analysis here.

By Xiaopeng ZhangJune 18, 2019

Threat Research

Predator the Thief: New Routes of Delivery

FortiGuard Labs discovered a running campaign against Russian-speakers using a new version of “Predator the Thief” stealer malware. The same actor was using one set of dummy files to deliver the stealer via different forms of phishing, including Zipped files, fake documents, fake pdfs, and the WinRAR exploit described in CVE-2018-20250.

Industry Trends

Watching Out For IoT and Mobile Threats During the Holidays

In addition to remaining vigilant for new threats and vulnerabilities, don’t lose sight of what’s happening within your own environment. Basic cyber hygiene is perhaps the most neglected element of security today.

By Anthony GiandomenicoDecember 25, 2018