VMware ESXi Command Injection Vulnerability

Overview VMware is the market leader in cloud infrastructure software, with over 41% market share. The VMware ESXi solution is a bare metal hypervisor that installs directly onto your physical server and partitions it into multiple virtual machines. The FortiGuard Labs team recently discovered a command injection vulnerability in VMware ESXi. This Continue Reading

The Bi-Directional Cloud Highway: Critical Insights into Today’s Cloud Infrastructures

The development of the cloud over the last 15 years is one of the most significant convergences of computing and communications technologies in history. It provides unprecedented agility and scalability for organizations, immediate access to information and transactions for individuals and has transformed our global economy similar to smartphones and Continue Reading

Undocumented Excel Variable Used in Malicious Spam Run Targeting Japanese Users

Over the course of the past few months, the FortiGuard SE group has been utilizing and enhancing the Fortinet machine learning systems to detect emerging threats. Recently, one of those machines detected an anomalous spike that led us to discover a malware campaign that had been using social engineering techniques Continue Reading

Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported. Effective July 30, 2019, technical support will be discontinued for the following product versions: MDaemon – Versions 14.5.x and below Security Gateway – Versions 4.5.x and below Outlook Connector Continue Reading

Critical Strategies for Staying Ahead of Emerging Cyberthreats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. Organizations have spent the last two decades updating their security gear to keep up with the latest threats and attack vectors. In the late 1990s, the creation of Continue Reading

5G Implications for Security

Mobile network infrastructures have evolved dramatically over just a few short years. The evolution from 3G to 4G, for example, enabled the mobile infrastructure to deliver new data-centric services to consumer, such as rich multimedia, along with enhanced content capabilities and services. 5G will enhance the power and capacity of mobile Continue Reading

Endless Zero-Days?

The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6 percent were actually exploited in the wild. The challenge is that predicting which vulnerability will be targeted next, and which exploit will Continue Reading

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading

Zimbra’s Wiki – now 17x Faster!

Greetings, Friends. Over the last few months we received reports that our Tech Center was suffering from occasional timeouts or long waiting periods. Not good! We know that our tech articles are critical for your Zimbra deployments and/or configurations, so I have good news for you today. But first, a Continue Reading

Rewriting IDAPython Script objc2_xrefs_helper.py for Hopper

Security researchers have identified more and more Mac OS malware attacks over the past two years. In June 2017, Rommel Joven and Wayne Chin Yick Low from Fortinet’s Fortiguard Labs found and analyzed a new ransomware targeted at Mac OS.  Most malware for Mac OS was developed in the Objective-C Continue Reading

>