fortiguard | Page 8

Fortinet recently sponsored an expert panel on cybersecurity at the Denver Biz Tech Expo - One takeaway? Security talks aren’t just for hackers anymore. Fortinet researchers participate in a lot of conferences. Many, like this year’s Hack.Lu in Luxembourg, are very much “for the cybersecurity community, by the cybersecurity community.” I loved one of the lines from Axelle Apvrille, a Fortinet senior antivirus analyst, in her writeup from the conference: This year's edition was quite classical - Windows/Linux reverse engineering/exploitation,... [Read More]
by RSS Chris Dawson  |  Nov 20, 2014  |  Filed in: Industry Trends
Emerging threats have created some strange bedfellows in the Cyber Threat Alliance but the group’s work is critical to advancing security in an increasingly connected world. The Cyber Threat Alliance (CTA) has brought together some of the top names (and fiercest competitors) in enterprise security to address emerging challenges and the most serious, complex threats to organizations that the Internet has ever seen. The founding members, Fortinet, McAfee, Palo Alto Networks, and Symantec, have all committed to sharing threat information to better... [Read More]
by RSS Chris Dawson  |  Nov 01, 2014  |  Filed in: Industry Trends
Just take a look at the latest news headlines and you’ll get a strong picture of just how pervasive and, in many ways, elusive the world of cyber security has become. Each week it seems there are reports of new, more insidious attacks. So the idea of “knowing your enemy” isn’t simply a catchy phrase for the team that I now have the privilege of working with. They are called the FortiGuard Labs and when I started at Fortinet just six weeks ago, I quickly realized they are this company’s best-kept secret. Let’s be clear, FortiGuard isn’t... [Read More]
by RSS Karin Shopen  |  Oct 30, 2014  |  Filed in: Industry Trends
Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don't think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thrives on our carefree downloading reflex. Say hello to Torpig. A "drive-by download" is when a website suddenly prompts you to do something, such as a "click here to close this ad." Many unsuspecting web surfers simply hit yes. Distributed mainly by drive-by download, the Torpig (or Sinowal) Trojan... [Read More]
by RSS Michael Perna  |  Jul 16, 2014  |  Filed in: Industry Trends
You have one new notification! Most people don't think twice about a message from a friend on instant messenger, a link to a funny video from a work colleague, or a USB drive with the latest family album. Most of us also assume the next best cat meme isn't going to offload our banking passwords to a remote server, hijack our system for DoS attacks, or hide all the files on our desktop. Unfortunately, Dorkbot does all of these things. Fortinet's threat research division, FortiGuard Labs reported a 0.98% increase in activity from Dorkbot just... [Read More]
by RSS Michael Perna  |  Jul 09, 2014  |  Filed in: Industry Trends
This month's Security Threat Landscape with Network World's Keith Shaw and Fortinet's Derek Manky covers everything from the FBI crack down on Blackshades to eBay. [Read More]
by RSS Michael Perna  |  Jun 02, 2014  |  Filed in: Industry Trends
[ This article originally appeared in Virus Bulletin ]( <br/>Medfos is a heavily obfuscated trojan family which downloads modules capable of redirecting search engine results in the most popular browsers, including Chrome, Firefox and Internet Explorer. Its main module, the downloader, was found to be distributed via the Sasfis botnet. This article dissects the way the Medfos downloader deploys its downloaded modules, and the function of each. <p style="text-indent:... [Read More]
by RSS Benjamin Chang  |  Mar 12, 2014  |  Filed in: Security Research
date: 2014-05-01 01:00:00 -0700 category: "Security Research" [ This article originally appeared in Virus Bulletin ]( [ For Part 1 of this article Click Here ]( Sality has been around for many years, yet it is still one of today's most prevalent pieces of malware. Last month, we described Sality's algorithm, showing the strengths of its encryption, how it uses the stack as temporary memory for code manipulation, and... [Read More]
by RSS Raul Alvarez  |  Jul 30, 2012  |  Filed in: Security Research
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
For most organizations, regardless of industry, forming strategic partnerships are critical in achieving objectives. In the case of security organizations, partnerships are vital for better sharing and disseminating threat information, disrupting malware and tracking down cybercriminals and handing them over to appropriate law enforcement channels for prosecution. The FortiGuard team at Fortinet, for example, has partnerships with organizations such as VirusTotal, an independent online service that analyzes files and URLs in an effort to aid the... [Read More]
by RSS Stefanie Hoffman  |  May 17, 2012  |  Filed in: Industry Trends