threat landscape | Page 2


This week Fortinet released its latest Threat Landscape Report - a collection of threats, attacks, and data collected from live production environments of all sizes and types. As part of our Cyber Threat Assessment Program (CTAP), enterprises and organizations were given the opportunity to place one of Fortinet’s high-performance FortiGate NGFW appliances inside their networks to see just how many threats and attacks attempt to (or successfully) gain purchase inside their infrastructure. Some key findings in the report include: unexpected... [Read More]
by RSS Richard Henderson  |  Feb 25, 2016  |  Filed in: Industry Trends
Trust is a tricky thing. It’s hard to gain, easy to lose, and exceptionally difficult to win back. Following the Edward Snowden disclosures and ongoing wrangling in Congress and the courts about privacy, monitoring, and data collection, trust between the public and private sectors, especially in the IT and security space, has been in short supply. It comes as no surprise then, that more than a few companies and individuals in the security industry have pushed back on government efforts to increase data sharing and collaboration around threat... [Read More]
by RSS Chris Dawson  |  May 19, 2015  |  Filed in: Industry Trends
FortiGuard's Global Security Strategist Derek Manky spoke with Network World's Keith Shaw late last week to discuss some hot topics in the threat landscape. Derek and Keith discuss at length BadBIOS, how it might work and where we may see it or other malware move in the near future. They also touch on the bug found in Supermicro IPMI that could allow low-level control of servers and wrap up with a discussion on the explosion of the Cryptolocker ransomware. Some more details on Cryptolocker and ransomware in general follows after the video link... [Read More]
by RSS Richard Henderson  |  Nov 18, 2013  |  Filed in: Industry Trends
In Fortinet's Latest Threat Landscape Report, Fortinet looks back at the security predictions they made at the beginning of the year and compares them to where we are today. How right or wrong were they? See the info graphic below. Download the full report for even more threat landscape news. Report highlights include: - The increase of mobile malware on Android devices including new mobile ransomware - The continued proliferation of the ZeroAccess botnet and which countries are seeing the biggest infection rates - The Citadel botnet takedown -... [Read More]
by RSS Michael Perna  |  Jul 30, 2012  |  Filed in: Industry Trends
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
Machine-to-machine (M2M) communications applications are working their way beyond traditional utility, traffic control and telemedicine industries, as enterprises search for ways it can benefit their businesses despite some real risks. ZDNet's Tim Lohman recently penned an article about how the automated communication of data between connected devices, M2M, is envisioned more and more by CIOs as delivering real value, cost savings and innovation in management. Lohman says now that networking equipment (a simple SIM card or RFID chip, in the case... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
On this episode of Network World's Security Landscape, Derek Manky from Fortinet and Keith Shaw discuss the latest security threats seen worldwide. This includes the rise of do-it-yourself crimeware botnet kits, as well as the possibility of another iPhone jailbreak vulnerability on Oct. 10, 2010. [Read More]
by RSS Rick Popko  |  Oct 14, 2010  |  Filed in: Security Research
In the September edition of Security Minute with Fortinet, researcher Derek Manky talks about the most prevalent threats and threat trends plaguing the internet over the last 30 days, including the latest Twitter worm, Zeus and Zitmo, various software vulnerabilities, and the "Here You Have" virus. [Read More]
by RSS Rick Popko  |  Sep 30, 2010  |  Filed in: Security Research
In January 2010, the Fortinet’s FortiGuard Labs threat researchers issued a report outlining their predictions for The Top 10 Security Trends for 2010. Now that we’re midway through the year, we thought it would be interesting to see how right (or wrong) we were and if anything completely unexpected has come up along the way. The following report spells out the trends the team predicted at the beginning of the year and concludes with comments on where each threat exists today. 1) Security, Virtually Speaking **January 2010: **“Preventing... [Read More]
by RSS Derek Manky  |  Jun 23, 2010  |  Filed in: Security Research
Overall malware volume returned to pre-October levels this period, after two months of record activity driven by ZBot, Bredolab and Pushdo/Cutwail. Nonetheless, the Bredolab loader returned to top spot with a vengeance this period, accounting for a whopping 66.5% of total detected malware activity. Again, as we have seen time and time again these attack campaigns typically do not last longer than a couple of days, but can return quickly in mass volume. The seeding engines (largely the Cutwail spamming trojan) behind Bredolab certainly have a lot... [Read More]
by RSS Derek Manky  |  Dec 28, 2009  |  Filed in: Security Research