Blog Archive

Feb 16th, 2017 PHPMailer Powered – Use It, But Also Remember to Update It by Tien Phan 
Feb 16th, 2017 RSA 2017 Roundup by Bill McGee
Feb 16th, 2017 Ransomware-as-a-Service: Rampant in the Underground Black Market by Rommel Joven
Feb 15th, 2017 The Challenge of Securing IoT by John Maddison
Feb 14th, 2017 REMCOS: A New RAT In The Wild by Floser Bacurio and Joie Salvio
Feb 13th, 2017 Fortinet Hits the Road with IDC and VMware to Help Enterprises with Agile Cloud Security
 by Annabelle Sou
Feb 13th, 2017 Effectively Using Threat Intelligence by Ken Xie
Feb 10th, 2017 Information Sharing in Cybersecurity Today Q&A with Derek Manky by John Welton
Feb 9th, 2017 Byline: Solving IoT Security - Pursuing Distributed Security Enforcement by Ken McAlpine
Feb 8th, 2017 Fortinet at RSA 2017 by Bill McGee
Feb 7th, 2017 Cloud is the New Normal: The Challenge of Securing Workloads in the Cloud – Are You Ready? by Katrina Fox
Feb 6th, 2017 Byline: Protecting Connected Cars by Anthony Giandomenico
Feb 6th, 2017 The Analysis of ISC BIND Response Authority Section RRSIG Missing DoS (CVE-2016-9444) by Dehui Yin
Feb 6th, 2017 Watch Out For Fake Online Gaming Sites And Their Malicious Executables by Lilia Elena Gonzalez Medina
Feb 6th, 2017 Q&A: Predicted Threats to the Healthcare Industry in 2017 by Derek Manky
Feb 3rd, 2017 Fortinet’s Partnership with the NHS Alliance in the UK – a Q&A by Viktoriya Cherneva
Feb 2nd, 2017 A Closer Look at Sage 2.0 Ransomware along with Wise Mitigations by Floser Bacurio, Joie Salvio, Rommel Joven
Feb 1st, 2017 Ransomware And The Boot Process by Raul Alvarez
Jan 31st, 2017 Innovation Insights: Defining and Securing IoT by Phil Quade
Jan 30th, 2017 Saudi Organizations Targeted by Resurfaced Shamoon Disk-Wiping Malware by Artem Semenchenko
Jan 30th, 2017 Not Concerned About Web Application Attacks in Financial Services? Well, You Should Be by Brian Forster
Jan 27th, 2017 CISO Customer Panel - Accelerate 2017 by Bill McGee
Jan 27th, 2017 Multiple XSS Vulnerabilities Discovered In IBM Infosphere BigInsights by Honggang Ren
Jan 27th, 2017 Fortinet at HIMSS 2017: Two Sessions to Attend by Susan Biddle
Jan 26th, 2017 Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer by Kai Lu
Jan 26th, 2017 2017 Cybersecurity Predictions for Financial Services: What to Watch For by Brian Forster
Jan 26th, 2017 Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java by Kai Lu
Jan 25th, 2017 The Analysis of ISC BIND NSEC Record Handling DoS (CVE-2016-9147) by Dehui Yin
Jan 23rd, 2017 The Move to Consolidation and Integration: Simplifying Security in Financial Services by Bart Richards
Jan 20th, 2017 Linux Gafgyt.B!tr Exploits Netcore Vulnerability by Amir Zali
Jan 18th, 2017 Analysis of ISC BIND TKEY Query Response Handling DoS (CVE-2016-9131) by Dehui Yin
Jan 17th, 2017 Fortinet Security Researcher Discovers Two Critical Vulnerabilities in Adobe Flash Player by Kai Lu
Jan 16th, 2017 Android Locker Malware uses Google Cloud Messaging Service by Kai Lu
Jan 16th, 2017 Accelerate 2017 Update General Sessions Overview – Day Two by Bill McGee
Jan 12th, 2017 Recognizing Fortinet’s Partner of the Year Winners by Bill McGee
Jan 11th, 2017 Accelerate 2017 Update General Sessions Overview – Day One by Bill McGee
Jan 10th, 2017 Innovation Insights: Protecting A Hyperconnected World by Ken Xie
Jan 10th, 2017 Extending the Security Fabric: FortiOS 5.6 and Intent-Based Network Security by John Maddison
Jan 10th, 2017 Extending the Security Fabric: Refining the Security Operations Center by Michael Reinhart
Jan 8th, 2017 Welcome to Accelerate 2017 by Bill Mc Gee
Jan 6th, 2017 The Role of Endpoint Security in Today’s Healthcare IT Environment by Susan Biddle
Jan 5th, 2017 Analysis of PHPMailer Remote Code Execution Vulnerability (CVE-2016-10033) by Zhouyuan Yang
Jan 5th, 2017 IoT is the Weakest Link for Attacking the Cloud by Douglas Jose Pereira dos Santos
Jan 4th, 2017 A Multitude of IoT Operating Systems Is Bad News for the Safety of the Internet by Hemant Jain
Jan 3rd, 2017 A Guide to Security for Today's Cloud Environment by Bill McGee
Dec 29th, 2016 The Evolution of the Financial Services CIO Since Y2K by Brian Forster
Dec 28th, 2016 Byline: Is it Finally Time for Open Security? by Ken McAlpine
Dec 27th, 2016 Byline: Meeting The Challenge of Securing the Cloud by Michael Xie
Dec 22nd, 2016 Byline: Four Things To Look For When Choosing A Financial Services Cloud Security Provider by Brian Forster
Dec 21st, 2016 Byline: 4 Key Areas to Consider When Solving the Cybersecurity Talent Gap by Steve Kirk
Dec 20th, 2016 Making Smart Cities Safe by Anthony Giandomenico
Dec 19th, 2016 Protect Your Patients with Internal Segmentation Firewalls by Susan Biddle
Dec 16th, 2016 Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware by Joie Salvio and Rommel Joven
Dec 16th, 2016 WooCommerce Tax Rates Cross-Site Scripting Vulnerability by Zhouyuan Yang
Dec 15th, 2016 Public and Private Cloud Adoption - What Financial Services Need to Know by Brian Forster
Dec 14th, 2016 Why Employees Could Be the Biggest Threat to Healthcare Data Security by Susan Biddle
Dec 13th, 2016 Byline: Enhancing Security Through Information Sharing by Ken McAlpine
Dec 12th, 2016 Byline: Don’t Neglect Security in M&A Due Diligence by Drew Del Matto
Dec 9th, 2016 Research: A New Christmas Decorated Cerber Ransomware Has Arrived by Sarah (Qi) Wu, Jacob (Kuan Long) Leong
Dec 9th, 2016 Reading Your Tracker's Battery Level With a Standard Bluetooth 4.0 USB Dongle by Axelle Apvrille
Dec 8th, 2016 Research: Disassembling Linux/Mirai.B!worm by Axelle Apvrille
Dec 8th, 2016 Fortifying the Smart Cities by Hemant Jain
Dec 7th, 2016 Research: Furtive Malware Rises Again by Douglas Jose Pereira dos Santos, Artem Semenchenko
Dec 7th, 2016 Q&A on Using a Real Time Sandbox to Thwart Packed Malware by Ladi Adefala
Dec 6th, 2016 Deep Analysis of the Online Banking Botnet TrickBot by Xiaopeng Zhang
Dec 6th, 2016 LinkedIn and Baidu Redirecting to Fat-Loss and Brain Improvement Scam by Nelson Ngu
Dec 5th, 2016 A Closer Look at the Mamba Ransomware that Struck San Francisco Rail System by Joie Salvio
Dec 5th, 2016 Q&A: How Fortinet’s Security Fabric Creates New Opportunity for Channel Partners by John Welton
Dec 2nd, 2016 Cerber 5.0.1 Arrives with New Multithreading Method by Sarah Wu, Jacob Leong
Dec 2nd, 2016 3 Ways Recent DDoS and Ransomware Attacks Have Put Healthcare Institutions on Alert by Susan Biddle
Dec 1st, 2016 Manage Your Reputation - Ensure Data Security in Financial Services by Brian Forster
Nov 30th, 2016 Bladabindi Remains A Constant Threat By Using Dynamic DNS Services by Lilia Elena Gonzalez Medina
Nov 30th, 2016 Security Leads the Way for MSO Evolution to MSP by Rick Mashburn
Nov 29th, 2016 Hackathon Sophia Antipolis 2016 by Axelle Apvrille
Nov 29th, 2016 Fortinet Joins AWS Public Sector Partner Program to Accelerate Cloud Security for Government and SLED Organizations by Chad Whalen
Nov 28th, 2016 A New All-in-One Botnet: Proteus by Donna Wang, Jacob (Kuan Long) Leong
Nov 28th, 2016 Q&A: Defining a Holistic Strategy for Customers by John Welton
Nov 25th, 2016 Ready for Cyber Monday? Maybe Not? by Anthony Giandomenico
Nov 24th, 2016 Managing the Attack Surface of a Smart City by Hemant Jain
Nov 23rd, 2016 Analysis of OpenSSL ChaCha20-Poly1305 Heap Buffer Overflow (CVE-2016-7054) by Dehui Yin
Nov 23rd, 2016 Ready for the Holidays? Maybe Not? by Anthony Giandomenico
Nov 22nd, 2016 FortiCast: The New Podcast about Fortinet Technology by Victoria Martin
Nov 22nd, 2016 With More Than 340 Patents and Counting, Fortinet’s Visionary Innovation is Driving the Evolution of Security by Darren Turnbull
Nov 21st, 2016 Fortinet 2017 Cybersecurity Predictions: Accountability Takes the Stage by Derek Manky
Nov 18th, 2016 Android Malware Masquerades as Banking App, Part II by Kai Lu
Nov 18th, 2016 DefCamp 2016 by Axelle Apvrille
Nov 18th, 2016 Android Banking Malware Masquerading as Email App Targets German Banks by Kai Lu
Nov 17th, 2016 Where I (Nearly) Won a Connected Coffee Machine at DefCamp 2016 by Axelle Apvrille
Nov 17th, 2016 Sharing Threat Intel: Easier Said Than Done by Derek Manky
Nov 15th, 2016 Wrap-up: US Campaign-themed Malware and Trolls by Joie Salvio and Rommel Joven
Nov 15th, 2016 Q&A: Securing the Move to the Cloud by Chad Whalen
Nov 14th, 2016 PC Locker - A New Survey Locker in the Wild by Sarah (Qi) Wu and Donna Wang
Nov 14th, 2016 Black Nurse DDoS Attack: Power of Granular Packet Inspection of FortiDDoS with Unpredictable DDoS Attacks by Hemant Jain
Nov 14th, 2016 Cybersecurity In this New Political Era by Anthony Giandomenico
Nov 11th, 2016 Q&A With FortiVeteran Program Graduate Chris Armstrong by John Welton
Nov 10th, 2016 Unmasking the Bonasira Cyperine Author by David Maciejak and Rommel Joven
Nov 9th, 2016 Fabric-Ready: Q&A with Ziften’s Josh Applebaum by Darlene Gannon
Nov 8th, 2016 Analysis of ISC BIND DNAME Answer Handling DoS (CVE-2016-8864) by Dehui Yin
Nov 8th, 2016 Why Healthcare Security Breaches Are Big Wins for Cybercriminals by Susan Biddle
Nov 7th, 2016 Shopping at the Online Blackmarketplace by Aamir Lakhani