FortiGuard Labs Threat Research
Fortinet security researchers discovered and reported zero-day vulnerabilities in Adobe Illustrator & Photoshop. This Patch Tuesday Adobe released several security patches and fixes. Read more.
FortiGuard Labs Threat Research
On Jan 22, 2019, Apple released macOS Mojave 10.14.3 and iOS 12.1.3. These two updates fixed a number of security vulnerabilities, including CVE-2019-6231 found in QuartzCore (aka. CoreAnimation). This blog provides a detailed analysis of this issue.
For your customers, identifying and quickly securing against modern cyberthreats is paramount—especially as they adopt digital transformation strategies to better meet the needs of their consumers. Unfortunately, cybercriminals are also moving at an increasingly rapid pace by continually innovating and evolving to exploit new attack vectors.
Agile software and application development add a layer of abstraction and complexity that cybercriminals have demonstrated to be more than willing and able to exploit.
Our recent threat landscape report shows that popular attack vectors are becoming more distributed. Learn why having real-time threat intelligence is integral to staying a step ahead of cyberattacks.
FortiGuard Labs Threat Research
Highlights from the latest Fortinet Threat Landscape Report, a valuable resource for any organization looking to stay ahead of today’s latest threat challenges.
FortiGuard Labs Threat Research
FortiGuard Labs recently caught one of Trickbot’s C2 (Command and Control) servers sending commands to its victims that instructed its bots to download what turned out to be an updated variant of the IcedID banking Trojan.
FortiGuard Labs Threat Research
In this article, we will discuss the changes made to PyRoMine, as well as how the ETERNALROMANCE exploit was used to distribute yet another Monero miner we have dubbed PyRoMineIoT.
FortiGuard Labs Threat Research
As a member of the Cyber Threat Alliance (CTA), FortiGuard Labs received critical information and additional findings showing the VPNFilter campaign is targeting significantly more devices than initially thought, and contains additional capabilities, including the ability to deliver exploits to endpoints.
From cryptojacking to botnets to malware, cybercriminals keep evolving their attack methods to increase their success rates.