Tracking Down a Big Phish

A FortiGuard SE Threat Research Blog     As a threat researcher, I have learned that continually monitoring malicious activities often provides unique insights into criminal behavior. This is due to three things. First, threat actors tend to be more like sheep than mavericks because they work in clusters. I don’t Continue Reading

The 5 Business Advantages of SD-WAN

This blog was written in partnership with the IDG Editorial team. Organizations are increasingly embracing digital transformation to keep pace with emerging market trends, fluctuating customer demands, and increased competition. But traditional network architectures weren’t built to handle the workloads and complexities of most digital transformation initiatives. More troubling is Continue Reading

10 Top Features to Look for in an SD-WAN Solution

This blog was written in partnership with the IDG Editorial team. Eager to embrace digital transformation, many organizations are turning to software-defined WAN (SD-WAN) – and it’s easy to understand why. SD-WAN simplifies the management and operation of a WAN, reduces network complexity, increases network visibility, and leverages lower-cost Internet Continue Reading

A Breakthrough in Usability – Automatic Node Provisioning

As announced in the previous blog post, MySQL InnoDB Cluster just got a very much requested feature which makes a complete, out-of-the-box, easy-to-use and versatile HA solution – Automatic Node Provisioning. InnoDB cluster users can now rely on it for every single step of cluster deployment and management. From instance configuration Continue Reading

A Deep Dive Into IcedID Malware: Part III – Analysis of Child Processes

FortiGuard Labs Threat Analysis Report Series In Part II of this blog series, we identified three child processes that were created by the IcedID malware. In Part III below, we’ll provide a deep analysis of those child processes. Let’s get started! 0x01 Child process A (entry offset: 0x168E) This first Continue Reading

A Deep Dive Into IcedID Malware: Part II – Analysis of the Core IcedID Payload (Parent Process)

In part I of the blog, I demonstrated how to unpack the IcedID malware, hooking and process injection techniques used by IcedID, as well as how to execute the IcedID payload. In this part, let’s take a closer look at the core payload. 0x01 Overview Of The Payload The following is Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

>