In part two of the analysis of a recently discovered QBot campaign, discover how the core module collects data from a victim’s device, how it extracts submodules, how it injects its injection-module into other processes, and other malicious behaviors.
Learn how DNS tunneling works, how to configure well-known DNS tunneling attack rootkits to test the security and detection capabilities in your environment, and get industry best practices for mitigating this attack.
Read insights from two of our FortiGuard Labs researchers about the evolution of cyberattacks and how organizations can get out ahead of threats as their digital attack surface expands.
Following best practices of responsible disclosure, FortiGuard Labs discovered and reported vulnerabilities in Adobe Illustrator and After Effects, which Adobe addressed with out-of-band security updates. Learn more.
Explore how a global malicious spam campaign is targeting users who may be sympathetic to the Black Lives Matter movement.
Read more about the details of a privilege escalation vulnerability (CVE-2020-1296) in the Windows 10 platform discovered by FortiGuard Labs, which was recently patched by Microsoft.
Learn about the 3rd installment in this blog series, focusing on different tactics and techniques malicious actors use to complete their cyber missions and how organizations can prevent them.
Learn about the manual analysis of two DotNET use cases and how leveraging automated analysis technology can drastically reduce analysis time, and ultimately, response time.