TrickBot or Treat – Knocking on the Door and Trying to Enter

The FortiGuard SE Team discovered a particularly interesting targeted attack towards the end of August in Virus Total. The attack targeted a supplier for a distribution/logistics provider to a nation state. The email contained an attachment that appeared to have been sent by a company that manufactures and distributes electrical Continue Reading

How does the new SBC in 3CX V16 Perform?

Now that v16 Update 2 Beta is out, it’s time to give you an interesting glimpse of the performance stats on the new and soon-to-be-stable SBC. Even though the 3CX SBC is a little silent worker connecting your remote IP phones to 3CX, our latest test results show that it’s Continue Reading

MicroK8s in the Wild

Canonical released MicroK8s in December 2018, and as its popularity has grown, some interesting projects using this micro Kubernetes distribution have surfaced. To begin with a little background, Kubernetes is an open source container orchestrator that assists with deploying, upgrading and provisioning applications. Kubernetes is unique in that all the Continue Reading

MySQL 8.0.14 Replication Enhancements

MySQL 8.0.14 is out and it contains some new and very interesting replication enhancements. As always, we are very pleased to share with you the details about the exciting new features in this release. This blog post will provide you a summary of the features and subsequent blog posts will Continue Reading

Security Research News in Brief – May 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. This month, let’s do a bit of crypto… Past editions: Rowhammer is an attack on DRAM, which consists in repeatedly accessing given rows of the DRAM to cause random bit flips in adjacent rows. Until now, the attack Continue Reading

Evolving towards a Homogenous Society: The Risk of the New Digital Economy

The recent WannaCry attack was interesting for a couple of reasons. First, the speed and scale of the attack was impressive. Over the course of a couple of days, hundreds of thousands of systems were affected and disrupted. Second, it also unveiled a disturbing trend. The attack malware exploited a Continue Reading

Security Research News in Brief – April 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. Previous edition: March 2017 Figure 1: Hacking a vacuum cleaner The authors hacked a vacuum cleaner, which, besides cleaning, also includes an embedded camera and microphone. The hack wasn’t easy because the vacuum wasn’t too Continue Reading

Did you order those iTunes movies? Nope, it’s just phishing for Canadian Apple users

Over the weekend, we encountered an interesting variation of a phishing email targeting Apple users. The email contained an alleged receipt for five movies purchased from the iTunes Store that was so detailed that the user who received it, and who knows better, still almost fell for the scam. Figure Continue Reading

Security’s Reactive Response to the Cycle of Threats

We’re into the final quarter of the year, and the cyberthreat landscape continues to be interesting. This week in the Fortinet Threat Intelligence Brief we looked at a number of interesting trends around IoT botnets, continued ransomware problems – both through directed attacks and infected websites, and the spoofing of Continue Reading

Connection Management in Database Jones

How does an application configure its database connection?  I find this to be a pretty interesting question. As the application moves from a developer’s workstation to a test harness, then to staging, and on to production, the database connection properties can change each time.  What’s more, a separation of responsibilities usually Continue Reading

>