Blog Archive | Page 2

Dec 9th, 2016 Research: A New Christmas Decorated Cerber Ransomware Has Arrived by Sarah (Qi) Wu, Jacob (Kuan Long) Leong
Dec 9th, 2016 Reading Your Tracker's Battery Level With a Standard Bluetooth 4.0 USB Dongle by Axelle Apvrille
Dec 8th, 2016 Research: Disassembling Linux/Mirai.B!worm by Axelle Apvrille
Dec 8th, 2016 Fortifying the Smart Cities by Hemant Jain
Dec 7th, 2016 Research: Furtive Malware Rises Again by Douglas Jose Pereira dos Santos, Artem Semenchenko
Dec 7th, 2016 Q&A on Using a Real Time Sandbox to Thwart Packed Malware by Ladi Adefala
Dec 6th, 2016 Deep Analysis of the Online Banking Botnet TrickBot by Xiaopeng Zhang
Dec 6th, 2016 LinkedIn and Baidu Redirecting to Fat-Loss and Brain Improvement Scam by Nelson Ngu
Dec 5th, 2016 A Closer Look at the Mamba Ransomware that Struck San Francisco Rail System by Joie Salvio
Dec 5th, 2016 Q&A: How Fortinet’s Security Fabric Creates New Opportunity for Channel Partners by John Welton
Dec 2nd, 2016 Cerber 5.0.1 Arrives with New Multithreading Method by Sarah Wu, Jacob Leong
Dec 2nd, 2016 3 Ways Recent DDoS and Ransomware Attacks Have Put Healthcare Institutions on Alert by Susan Biddle
Dec 1st, 2016 Manage Your Reputation - Ensure Data Security in Financial Services by Brian Forster
Nov 30th, 2016 Bladabindi Remains A Constant Threat By Using Dynamic DNS Services by Lilia Elena Gonzalez Medina
Nov 30th, 2016 Security Leads the Way for MSO Evolution to MSP by Rick Mashburn
Nov 29th, 2016 Hackathon Sophia Antipolis 2016 by Axelle Apvrille
Nov 29th, 2016 Fortinet Joins AWS Public Sector Partner Program to Accelerate Cloud Security for Government and SLED Organizations by Chad Whalen
Nov 28th, 2016 A New All-in-One Botnet: Proteus by Donna Wang, Jacob (Kuan Long) Leong
Nov 28th, 2016 Q&A: Defining a Holistic Strategy for Customers by John Welton
Nov 25th, 2016 Ready for Cyber Monday? Maybe Not? by Anthony Giandomenico
Nov 24th, 2016 Managing the Attack Surface of a Smart City by Hemant Jain
Nov 23rd, 2016 Analysis of OpenSSL ChaCha20-Poly1305 Heap Buffer Overflow (CVE-2016-7054) by Dehui Yin
Nov 23rd, 2016 Ready for the Holidays? Maybe Not? by Anthony Giandomenico
Nov 22nd, 2016 FortiCast: The New Podcast about Fortinet Technology by Victoria Martin
Nov 22nd, 2016 With More Than 340 Patents and Counting, Fortinet’s Visionary Innovation is Driving the Evolution of Security by Darren Turnbull
Nov 21st, 2016 Fortinet 2017 Cybersecurity Predictions: Accountability Takes the Stage by Derek Manky
Nov 18th, 2016 Android Malware Masquerades as Banking App, Part II by Kai Lu
Nov 18th, 2016 DefCamp 2016 by Axelle Apvrille
Nov 18th, 2016 Android Banking Malware Masquerading as Email App Targets German Banks by Kai Lu
Nov 17th, 2016 Where I (Nearly) Won a Connected Coffee Machine at DefCamp 2016 by Axelle Apvrille
Nov 17th, 2016 Sharing Threat Intel: Easier Said Than Done by Derek Manky
Nov 15th, 2016 Wrap-up: US Campaign-themed Malware and Trolls by Joie Salvio and Rommel Joven
Nov 15th, 2016 Q&A: Securing the Move to the Cloud by Chad Whalen
Nov 14th, 2016 PC Locker - A New Survey Locker in the Wild by Sarah (Qi) Wu and Donna Wang
Nov 14th, 2016 Black Nurse DDoS Attack: Power of Granular Packet Inspection of FortiDDoS with Unpredictable DDoS Attacks by Hemant Jain
Nov 14th, 2016 Cybersecurity In this New Political Era by Anthony Giandomenico
Nov 11th, 2016 Q&A With FortiVeteran Program Graduate Chris Armstrong by John Welton
Nov 10th, 2016 Unmasking the Bonasira Cyperine Author by David Maciejak and Rommel Joven
Nov 9th, 2016 Fabric-Ready: Q&A with Ziften’s Josh Applebaum by Darlene Gannon
Nov 8th, 2016 Analysis of ISC BIND DNAME Answer Handling DoS (CVE-2016-8864) by Dehui Yin
Nov 8th, 2016 Why Healthcare Security Breaches Are Big Wins for Cybercriminals by Susan Biddle
Nov 7th, 2016 Shopping at the Online Blackmarketplace by Aamir Lakhani
Nov 3rd, 2016 Don’t Call Me an Expert, Call Me a Hacker by Michael Chalmandrier-Perna
Nov 2nd, 2016 The Angry Spam and The Tricky Macro Delivers Updated Hancitor by Joie Salvio and Rommel Joven
Nov 1st, 2016 Android banking malware masquerades as Flash Player, targeting large banks and popular social media apps by Kai Lu
Nov 1st, 2016 Recent Security Trends We’ve Seen in Financial Services by Brian Forster
Oct 31st, 2016 The First Major Update of Cerber 4 Ransomware Has Surfaced by Sarah (Qi) Wu and Jacob (Kuan Long) Leong
Oct 31st, 2016 IoT-based Linux/Mirai: Frequently Asked Questions by Axelle Apvrille
Oct 31st, 2016 The Challenge of E-Voting by Anthony Giandomenico
Oct 31st, 2016 Microsoft Kernel Integer Overflow Vulnerability by Honggang Ren
Oct 28th, 2016 On Email’s Birthday, Here’s a Look at How to Keep it Safe by David Finger
Oct 27th, 2016 Microsoft and Fortinet Extend Partnership to Secure Mission-Critical Workloads in Azure Government Cloud by John Welton
Oct 27th, 2016 Driverless Cars: A New Way of Life Brings a New Cybersecurity Challenge by Anthony Giandomenico
Oct 27th, 2016 Joomla – From Nowhere to High Privilege by Tien Phan
Oct 26th, 2016 The Glider by Michael Chalmandrier-Perna
Oct 25th, 2016 Scaling the Cloud: OpenStack and Security by John Welton
Oct 25th, 2016 2016 Wrap-Up by Axelle Apvrille
Oct 24th, 2016 Locky Happens: Notorious Ransomware Leaves an Unpleasant Trace by Floser Bacurio Jr. and Joie Salvio
Oct 24th, 2016 Mirai Botnet ­: Protect Your Infrastructure with FortiDDoS by Hemant Jain
Oct 24th, 2016 Information-stealing Malware Is Spread Via Word Document by Xiaopeng Zhang
Oct 24th, 2016 IoT malware are coming. Will you listen to me now? by Axelle Apvrille
Oct 21st, 2016 When Half the Internet Goes Down Due to a Cyber-Assault on DNS Infrastructure by Hemant Jain
Oct 21st, 2016 Fortinet Researchers Discover Two Critical Vulnerabilities in Adobe Acrobat and Reader  by Kai Lu and Kushal Shah
Oct 21st, 2016 4 Motives Behind Why the Healthcare Security Market is Surging by Susan Biddle
Oct 20th, 2016 TheMoon - A P2P botnet targeting Home Routers by Bing Liu
Oct 19th, 2016 "JapanLocker": An Excavation to its Indonesian Roots by Artem Semenchenko and Joie Salvio
Oct 19th, 2016 The Killer App For Cloud: Accelerating the Deployment of NFV Solutions by James Cabe
Oct 18th, 2016 Virus Bulletin 2016 Denver Wraps Up by Floser Bacurio Jr. and Rommel Joven
Oct 18th, 2016 Fortinet Fabric Ready Program- More Open than Ever by David Finger
Oct 17th, 2016 Securing Next-Generation Data Centers by Ronen Shpirer
Oct 17th, 2016 Fortinet Achieves VMware Ready™ Status for Network Functions Virtualization! by Warren Wu
Oct 17th, 2016 IBM Rational Collaborative Lifecycle Management XSS Vulnerability by Honggang Ren
Oct 14th, 2016 A Brazilian Trojan Using A Jar File, VB Scripts And A DLL For Its Multi-Stage Infection by Lilia Elena Gonzalez Medina
Oct 14th, 2016 Fortinet Fabric-Ready Partner Spotlight: Q&A with Pamela Cyr, Senior Vice President of Business Development at Tufin by Darlene Gannon
Oct 14th, 2016 Pebble Smartwatch Talk at Virus Bulletin 2016 by Axelle Apvrille
Oct 13th, 2016 NSS Labs 2016 NGIPS Group Testing by John Maddison
Oct 12th, 2016 Analysis of OpenSSL Large Message Size Handling Use After Free (CVE-2016-6309) by Dehui Yin
Oct 12th, 2016 Home Routers - New Favorite of Cybercriminals in 2016 by Bing Liu
Oct 12th, 2016 Financial Services Cybersecurity Checklist: Staying Ahead of the Curve by Brian Forster
Oct 11th, 2016 OffensiveWare: A New Malware-as-a-Service Platform Takes a Fitting Label by Joie Salvio
Oct 10th, 2016 Students, Veterans Address Talent Gap by Stephan Tallent
Oct 10th, 2016 Q&A: How Fortinet is Helping Retailers Meet PCI DSS Requirements by John Welton
Oct 7th, 2016 Next Gen Lock: the Good, the Bad, and the Smart, Part II: Fortinet Analysis by David Maciejak
Oct 7th, 2016 Security’s Reactive Response to the Cycle of Threats by Bill McGee
Oct 6th, 2016 Next Gen Lock: the Good, the Bad, and the Smart, Part I: The Problem by David Maciejak
Oct 5th, 2016 Network Security Trifecta: 3 Positive Impacts Integrated Security Solutions Can Have on Healthcare Institutions by Susan Biddle
Oct 4th, 2016 Preparing Your Network for the IoT Revolution by Ken McAlpine
Oct 4th, 2016 So You Want to Be a (Ethical) Hacker? by Michael Chalmandrier-Perna
Oct 3rd, 2016 The Locky Saga Continues: Now Uses .odin as File Extension by Joie Salvio and Floser Bacurio Jr.
Oct 3rd, 2016 Proactive Hacking to Build Better Security by Aamir Lakhani
Sep 30th, 2016 Thinking Like a Cybercriminal to Prevent Financial Services Data Breaches by Brian Forster
Sep 30th, 2016 We’re Up All Night to Get Locky by Floser Bacurio, Rommel Joven and Roland Dela Paz
Sep 29th, 2016 Q&A: Threat Intelligence and the Threat Landscape by John Welton
Sep 28th, 2016 A Security Fabric Needs to Be Local AND Global by Bill McGee
Sep 28th, 2016 Fortinet Delivers Automated Network Security Operations for Splunk’s Adaptive Response Framework by Cynthia Hsieh
Sep 27th, 2016 Dissecting Mamba, the Disk-Encrypting Ransomware by Joie Salvio
Sep 27th, 2016 Ransomware to hit $1B in 2016 by Damien Lim
Sep 26th, 2016 Overview: Fortinet Threat Landscape Report by Bill McGee
Sep 26th, 2016 Innovation Insights: Securing Today’s Evolving IT Environments Requires Four Things by Bill McGee and John Maddison
Sep 26th, 2016 Innovation Insights: Defining Open with the Fortinet Security Fabric by John Maddison