Threat Intelligence Roundup – September 02, 2016

August ended with the spike in malware activity we predicted last week to welcome everyone back to school and work. Here is a summary of this week’s FortiGuard Threat Intelligence Brief. 1. Ransomware explodes. Ransomware took off this week, filling nine of our weekly top-ten malware detection list slots. Not Continue Reading

MySQL Group Replication: securing the perimeter!

Hi all, here is a new post following the blog series on the last MySQLvGroup Replication labs release which already presented: 1) the new features; 2) most asked questions; 3) summary of behaviour and configuration changes; and 4) the performance improvements.On this blog post I will provide a closer look Continue Reading

New Era in Anti-Virus Detection Evasions

In the last couple of months, we wrote about the discoveries we found in Dridex, the long-lived banking Trojan that is still quite active in-the-wild. In the blog post, TL;DR, we mentioned the Trojan has equipped with new module that could be used to evade one of the anti-virus products, Continue Reading

MySQL Group Replication: Important Behavior and Configuration Changes.

Hi everyone, its been a while since the last release of Group Replication. During this period we have been working hard to improve the plugin and give you a better user experience. Focused on solving several existing bugs, address performance issues and improving userexperience we renamed some variables, introduced new Continue Reading

MySQL Group Replication for 5.7.14

Hi everyone! It has been some time since the last MySQL Group Replication labs release was out. But the team has not been sitting on its hands. ? As such, it is time for a new labs release with new features, bug fixes and improvements across the board. This is Continue Reading

Insights on TorrentLocker

Summary During the last weeks there have been several cases of international brand names being used by malware authors to propagate malware through phishing emails. These emails contain misleading links that download malicious Zip files, which, in turn, contain a JavaScript file that downloads the TorrentLocker ransomware. The malicious files Continue Reading

Economical With The Truth: Making DNSSEC Answers Cheap

We launched DNSSEC late last year and are already signing 56.9 billion DNS record sets per day. At this scale, we care a great deal about compute cost. One of the ways we save CPU cycles is our unique implementation of negative answers in DNSSEC. CC BY-SA 2.0 image by Continue Reading

The Curious Case of an Unknown Trojan Targeting German-Speaking Users

Last week, an unidentified malware (with SHA-256 171693ab13668c6004a1e08b83c9877a55f150aaa6d8a624c3f8ffc712b22f0b) was discovered and circulated on Twitter by researcher @JAMES_MHT. Many researchers – including us – were unable to identify the malware so we decided to dig a bit further. In this post, we will share our findings about this malware: its targets, Continue Reading

Threat Intelligence Cyber Defense, Part 3 of 3

In my last blog we discussed some high level defensive tactics we can take within each phase of the attack chain, once we understand the attacker’s attack methodologies, in order to build a more intelligent defensive posture.  (https://blog.fortinet.com/post/threat-intelligence-cyber-defense-part-2-of-3)Now in this final blog in this series, I will take a look Continue Reading

>