Nine Top Priority Cybersecurity Threats Active in the Education Sector Today – and Why Everyone Should Care
Educational institution networks continue to be a favorite playground for cybercriminals. Because of the age and interests of the majority of educational users, these networks tend to incorporate cutting edge technologies and strategies ... Read More
FortiGuard Labs Discovers Vulnerability in Asus Router
Over the last few weeks, ASUS released a series of patches aimed at addressing a number of vulnerabilities discovered in their RT routers running AsusWRT firmware. The models listed at the end of this post are known to be vulnerable. If you are not sure which model or firmware you ... Read More
Meltdown/Spectre Update
In addition to establishing an aggressive and proactive patch-and-replace protocol, it is essential that organizations have layers of security in place designed to detect malicious activity and malware, and to protect vulnerable systems ... Read More
Why the Fortinet Security Fabric Is the “Secret Sauce” for Managed Security Services Providers
To cut to the chase, the technical features of Fortinet solutions are only half the story when it comes to the Fortinet Security Fabric's unmatched ability to deliver managed security services. Its secret sauce for managed security services providers (MSSPs) is really about adaptability, integration, and automation, as expressed through ... Read More
Preparing for Mandatory Notifiable Data Breach Legislation Part 1
Both Australia’s Mandatory Notifiable Data Breach legislation and the EU’s GDPR are shining a spotlight on state-of-the-art data security technoloies and strategies to help Australian organisations stay strong in an increasingly digitized world ... Read More
For a Moonshot, You Need More Than Just the Moon
At one time, we were challenged to ask not what our country could do for us but what we could do for our country. It is time that the leading organizations in digital technology come together once again to ask the same ... Read More
Considerations for Securing Medical Research in the Cloud
While cloud computing enables medical research, it also brings security concerns. Learn the top considerations for securing medical research in the cloud ... Read More
IoT Botnet: More Targets in Okiru’s Cross-hairs
The first Okiru sample appeared around October 2017 ,and FortiGuard Labs created a write up of its development last December, which included worm capabilities and the embedding of two different exploits. As a follow up, we will now share our findings on the latest Okiru variant that targets ARC processors ... Read More
A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature
One of the key features of Microsoft‘s patches is the “Kernel Virtual Address Shadow” (a term coined by Microsoft), or KVAS for short. This feature effectively blocks the Meltdown attack, as it leaves very little kernel memory accessible to user mode code. In this blog post we provide a deep ... Read More
Unified Threat Management for Higher Education
Higher education is embracing new technology and open networks to foster student innovation. Learn how unified threat management can manage cost and thwart threats while improving operational efficiency ... Read More
