cybercrime


Threat report data is only as useful as the analysis and context that goes along with it. We asked Derek Manky, global security strategist with our FortiGuard Labs team, to share his thoughts on what some of the data in our recent Threat Landscape Report means going forward. What at a high level did you find interesting in the report? What did the data tell you from your global point of view? A few things stood out to me based on my years of working with the FortiGuard Labs team. At a high level, visibility and control over today’s... [Read More]
by RSS John Welton  |  Jun 07, 2017  |  Filed in: Industry Trends
There are a couple of important takeaways from our Threat Landscape report. First, while the more high profile attacks have dominated the headlines, the reality is that the majority of threats faced by most organizations are opportunistic in nature. Criminals tend to target low hanging fruit, so it is critical that you minimize your visible and accessible attack surface. [Read More]
by RSS John Maddison  |  Jun 06, 2017  |  Filed in: Security Research
Introduction CVE-2017-0199 is a remote code execution vulnerability that exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploits this vulnerability can take control of an affected system and then install programs, view, change, or delete data, or create new accounts with full user rights. Microsoft issued a patch for this vulnerability April, and most security vendors have published alarms for it. Unfortunately, attacks targeting this vulnerability are still widely being used... [Read More]
by RSS Bahare Sabouri and He Xu  |  May 30, 2017  |  Filed in: Security Research
We regularly do deep dive Q&A pieces with our executives to share the leadership perspectives at Fortinet. Read below for an interview with Phil Quade, Fortinet's CISO.  [Read More]
by RSS John Welton  |  May 23, 2017  |  Filed in: Industry Trends
Fortinet has partnered with INTERPOL over the past two years to assist in identifying and thwarting cybercrime. Today, INTERPOL announced that a new operation across the ASEAN region, built around threat intelligence provided by Fortinet and other public and private sector security organizations, has resulted in the identification of nearly 9,000 Command and Control (C2) servers and hundreds of compromised websites, including government portals. [Read More]
by RSS Bill McGee  |  Apr 24, 2017  |  Filed in: Security Research
Investigate technologies that employ automation to analyze suspicious attachments, Web sites, and other avenues of attack. Fortinet delivers proactive malware identification and an unparalleled depth of analysis capabilities. This includes machine learning analysis capabilities backed up by a dedicated team of human analysts. Ask how FortiGuard Cyber Threat Intelligence services can be leveraged with the Fortinet Security Fabric to provide the strongest malware protection available in the industry. [Read More]
by RSS Keith Rayle  |  Apr 10, 2017  |  Filed in: Industry Trends
Read this post to find out why your employees might just be today’s biggest threat to healthcare data security. [Read More]
by RSS Susan Biddle  |  Dec 14, 2016  |  Filed in: Industry Trends
Malware and hacking services are becoming commoditized. Ransomware as a service has become popular this year. More effective security tools have cybercriminals looking for new tools and techniques to more effectively target victims and bypass security. And malware developers are continually looking for new markets where they can connect and sell their services. In the past, we have discussed the rise of the DarkNet as a cybercrime marketplace. But the reality is that many attackers simply use sites such as eBay, Craigslist, and other well-known... [Read More]
by RSS Aamir Lakhani  |  Nov 07, 2016  |  Filed in: Industry Trends
Can mobile carriers afford to put the loyalty of 47 percent of their customers at risk in the wake of a security breach? These are the stakes, according to a Nokia survey of more than 20,000 global customers. Carrier networks are at the forefront of today’s service revolution. With the expansion of cloud-based services and the emergence of the Internet of Things (IoT), carrier service offerings and network traffic are expected to grow exponentially into the future. In addition to the influx of connected devices thanks to IoT, carriers are... [Read More]
by RSS Richard Orgias  |  Sep 01, 2016  |  Filed in: Industry Trends
Preventing the loss of critical or sensitive data has been an issue for as long as there has been proprietary information and intellectual property. But recent developments both in regulatory requirements and in the evolution of network infrastructures, including BYOD, virtualization, sophisticated applications, shadow IT, and cloud environments, make it imperative that organizations take a new look at how they control and protect critical data. Most of the time, data loss is unintentional, attributed to employees that unknowingly violate security... [Read More]
by RSS Bill McGee  |  Apr 06, 2016  |  Filed in: Industry Trends