Securing the Network: What Three Key Verticals Require

Securing the Network: What Three Key Verticals Require

While new, innovative threats continue to pop up on almost daily, our latest Global Threat Landscape Report reveals that long known and yet still unpatched vulnerabilities continue to serve as the primary gateway for attacks, with organizations reporting an average of 274 attacks per firm – a 82% increase over ... Read More
Fortinet Blog | Latest Posts
OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers

OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers

In preparation for our talk entitled “IoT: Battle of Bots” at the RootedCon Security conference that will be held in Madrid, Spain this March 2018, the FortiGuard Labs team encountered yet another new Mirai variant ... Read More
Fortinet Blog | Latest Posts
Rise of the 'Hivenet': Botnets That Think for Themselves

Rise of the ‘Hivenet’: Botnets That Think for Themselves

Over the past few years, a new development has occurred: predictive software systems are being programmed using artificial intelligence techniques. The latest advances in these kinds of tools use swarm technology to leverage massive databases of expert knowledge comprised of billions of constantly updated bits of data in order to ... Read More
Fortinet Blog | Latest Posts
The Connected Campus: Digital Transformation in Education

The Connected Campus: Digital Transformation in Education

As the education space undergoes digital transformation, the IoT and artificial intelligence bring new risks and opportunities. Learn how schools can protect their networks while adopting new technology ... Read More
Fortinet Blog | Latest Posts
Steganography: Combatting Threats Hiding in Plain Sight

Steganography: Combatting Threats Hiding in Plain Sight

While still relatively unusual, security researchers report a 600% upsurge in steganographically-based attacks in 2017. Cybersecurity attackers use steganography to inject malicious content to slip past security defenses and exfiltrate misappropriated content from compromised systems ... Read More
Fortinet Blog | Latest Posts
FortiGuard Labs Threat Landscape Report Q4 2017 | CyberSecurity Trends

Swarming IoT Attacks, Cryptojacking, and Ransomware Drive Dramatic Spike in Malware

FortiGuard Labs just released our latest Quarterly Threat Landscape report for Q4 of 2017. As usual, there are a lot of take-aways for CISOs, but a few items stood out. In particular, attacks were up per firm by 82% and swarm cyber attacks targeted the Internet of Things (IoT) with ... Read More
Fortinet Blog | Latest Posts
Executive Insights: Surviving Your Digital Transformation

Executive Insights: Surviving Your Digital Transformation

2018 is lining up to be the year of Digital Transformation. Just about every organization looking to remain viable in the growing digital marketplace has some sort of digital transformation in progress or one in the planning stages for this year. These projects range from implementing basic applications to better ... Read More
Fortinet Blog | Latest Posts
Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress

Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress

The Mobile Security and Managed Security Services Zone area that we’re setting in up in our booth at this year’s Mobile World Congress (MWC) places Fortinet at the center of one of the most innovation-intensive sectors of Communication Service Providers (CSPs). The dawning era of 5G is about much more ... Read More
Fortinet Blog | Latest Posts
New jRAT/Adwind Variant Being Spread With Package Delivery Scam

New jRAT/Adwind Variant Being Spread With Package Delivery Scam

At the beginning of February 2018, FortiGuard Labs collected an email. The email message contains an order tracking number with a fake hyperlink that downloads a jar malware. After a quick analysis, I was able to determine that it is the jRAT/Adwind malware ... Read More
Fortinet Blog | Latest Posts
Securing SD-WAN in Distributed Healthcare Environments

Securing SD-WAN in Distributed Healthcare Environments

As healthcare providers adopt digital capabilities, traditional WANs are not equipped to keep up. Learn why SD-WANs are a better option, and how to secure them ... Read More
Fortinet Blog | Latest Posts
Loading...