High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Ruchna Nigam  |  June 20, 2011  |  Category: Security Research
A couple of days back, a game of Nerd Truth or Dare in the lab led to the shocking revelation that most of us were using our Facebook/Twitter accounts mainly to keep up with security blogs. Personally, being a twitter non-conformist until recently, I...
by RSS Doug Macdonald  |  February 15, 2011  |  Category: Security Research
In the past month changes in the SpyEye botnet kit have more or less stopped, after a very busy year in which many new versions were released. I was recently looking at all of the information I have from testing and analysis of these versions, when i...
by RSS Guillaume Lovet  |  January 27, 2011  |  Category: Security Research
Tomorrow starts the quite famous - and ever sold-out - security conference Shmoocon, held in Washington DC until Sunday. The keynote this year will be filled by Peiter Mudge Zatko, inventor of L0phtcrack and early pioneer of buffer overflows. Amon...
by RSS Doug Macdonald  |  December 14, 2010  |  Category: Security Research
The W32/Seftad RansomWare has been spreading for a few days now, locking infected computers and trying to extort money for a recovery password. The infection is easily recognized by the text message below, which is displayed when the computer starts...
by RSS Rick Popko  |  July 14, 2010  |  Category: Security Research
This month, Derek Manky, project manager, cyber security & threat research at Fortinet recorded an informative audio with Power Point presentation titled: “Threat Prevention: 2010 and Beyond.” This extremely enlightening discussion examines fo...
by RSS Derek Manky  |  June 23, 2010  |  Category: Security Research
In January 2010, the Fortinet’s FortiGuard Labs threat researchers issued a report outlining their predictions for The Top 10 Security Trends for 2010. Now that we’re midway through the year, we thought it would be interesting to see how right (or wr...
by RSS Bing Liu  |  May 04, 2010  |  Category: Security Research
Although it is not a new idea to run an executable from within a PDF, the researcher Didier Stevens present a trick technique to make it more practical, "in the real world". In this post I will dissect a PDF document using this trick (MD5: 1dcd4a3f5...
by RSS Bing Liu  |  March 24, 2010  |  Category: Security Research
If you haven't yet installed the latest patch apsb10-07 for your Adobe Reader and Acrobat, you should hurry. The exploit is in the wild! In this post I will dissect a PDF document (MD5: 48e0cc8629d492a64a2767949d2ed9bc), indeed found in the wild,...
by RSS Doug Macdonald  |  March 10, 2010  |  Category: Security Research
Recently I've been working on an analysis of Sasfis botnet communications. During the tests I noticed that when the bot installs itself, it adds a registry key named "idid", with some random looking data in it. The data was added under the name "url0...
by RSS Raul Alvarez  |  March 01, 2010  |  Category: Security Research
In-depth analysis of malware shows different methods of obfuscating their codes. They employ different tactics to hide themselves to harden analysis. They also dynamically load functions that they will be using. Those functions more often times calle...
by RSS Rick Popko  |  February 26, 2010  |  Category: Security Research
Two of Fortinet's FortiGuard Labs researchers will be on hand at next week's RSA Conference to present their research in the Fortinet booth theater (#2225). The presentations focus on ransomware and industrial spying, two hot topic areas that are on...
by RSS Kyle Yang  |  February 04, 2010  |  Category: Security Research
It's been two months since we revealed the 3rd Generation Pushdo/Cutwail/Webwail Botnet communication protocol and encryption. Recently, while researching a new bot (GoolBot), we found another Pushdo-like malware spreading with its help. After revers...
by RSS Axelle Apvrille  |  January 26, 2010  |  Category: Security Research
It had been a while since we'd last seen a malware transferring credits to pre-paid phone cards. Our last encounter dated back to SymbOS/Flocker!tr.python early January 2009. It is happening again, with Java/GameSat.A!tr, a Java ME midlet which is cu...
by RSS Bing Liu  |  January 19, 2010  |  Category: Security Research
Appearing in the first quarter of 2009, Gumblar spread rapidly and has become one of the biggest threats today[1]. Gumblar infects PC by exploiting vulnerabilities of Web Browsers and Browser Plugins, such as Adobe Acrobat Reader and Flash player. Th...

FortiGuard Labs on the Web

search results hidden links