New Rocke Variant Ready to Box Any Mining Challengers

FortiGuard Labs Breaking Threat Research FortiGuard Labs has been monitoring a Linux coin mining campaign from “Rocke” – a malware threat group specializing in cryptomining. Over the past month we have seen new features constantly being added to the malware. For instance, in their latest major update, they have added Continue Reading

IoT Security: Trickier Than You Think

In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new Continue Reading

We Have Seen the Enemy, and It Is Us

The job of the CSO and staff never stops. The security lifecycle requires constant attention through monitoring and analysis, responding to threats, and improving policies and protocols. Activities like patch and replace are Security 101. The trick is to always stay one step ahead of cybercriminals who are relentlessly targeting Continue Reading

Extending the Security Fabric: Refining the Security Operations Center

Monitoring, managing, and protecting the formless scope and scale of today’s highly distributed and dynamically changing digital enterprise network is a daunting task for IT and Security Operations Teams. The proliferation of IoT and mobile devices, the convergence of IT and OT, and adoption of cloud-based networking and services is Continue Reading

Home Routers – New Favorite of Cybercriminals in 2016

Fortinet has been monitoring the outbreak of attacks targeting home routers over the past several months. We plan to post a series of blogs to share our findings. In this post, we review the related statistical data that has been recorded by Fortinet. Since July of this year, it has Continue Reading

The Locky Saga Continues: Now Uses .odin as File Extension

As a result of our continuous monitoring of the Locky ransomeware we discovered a new Locky variant. This variant now appends a “.odin” extension to its encrypted files. This is now the third time that the extension has been changed. Aside from this, in this report we will also examine Continue Reading

Services Monitor

CWP Service monitor is monitoring and restarting selected services on your server. Service will be restared only if exit status shows error.If the service was shutdown and it is showing the status stopped then service monitor will NOT restart it. Example of service when it will NOT be restarted: # Continue Reading

>