New Attacks and Old Attacks Made New

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared on the Dark Reading website on April 16, 2019, entitled “New Attacks (and Old Attacks Made New).” Although cybercriminals depend on innovation in order to stay ahead of security safeguards, they are still subject to Continue Reading

Getting Ready for Swarm-as-a-Service

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared on the ThreatPost website on January 31, 2019. The digital world has created unprecedented opportunities – both for good and for ill. Advances in swarm technology, for example, have powerful implications in the fields of Continue Reading

Will Emerging Threats Tip the Scales?

This is a summary of an article that first appeared in SecurityWeek on December 07, 2018. Digital devices and infrastructures continue to be woven deeper into every aspect of our lives, whether through connected homes, cars, and mobile devices, or by expanding their role in business, government, and even critical Continue Reading

Locky Launches a More Massive Spam Campaign with New “Lukitus” Variant

It has just been a week since the variation of Locky named Diablo6 appeared. Now it has launched another campaign more massive than the previous. This time, it uses “.lukitus”, which means “locking” in Finnish, as the extension for the encrypted files. The FortiGuard Lion Team was the first to Continue Reading

Taking advantage of Data Sync in process-driven mobile applications

This blogpost from TORBJÖRN DAHLEN originally appeared on the blog of Red Hat Enterprise Solution Architects (open source.org) and has been adapted for this Red Hat Mobile Blog. Introduction For mobile users who require tasks, information or status updates asynchronously without requiring to explicitly request it, by for example pressing a refresh Continue Reading

Teardown of a Recent Variant of Android/Ztorg (Part 1)

Ztorg, also known as Qysly, is one of those big families of Android malware. It first appeared in April 2015, and now has over 25 variants, some of which are still active in 2017. Yet, there aren’t many technical descriptions for it – except for the initial Ztorg.A sample – so I decided Continue Reading

2017 and the Internet: our predictions

An abbreviated version of this post originally appeared on TechCrunch Looking back over 2016, we saw the good and bad that comes with widespread use and abuse of the Internet. In both Gabon and Gambia, Internet connectivity was disrupted during elections. The contested election in Gambia started with an Internet Continue Reading

>