Security’s Reactive Response to the Cycle of Threats

We’re into the final quarter of the year, and the cyberthreat landscape continues to be interesting. This week in the Fortinet Threat Intelligence Brief we looked at a number of interesting trends around IoT botnets, continued ransomware problems – both through directed attacks and infected websites, and the spoofing of Continue Reading

Connection Management in Database Jones

How does an application configure its database connection?  I find this to be a pretty interesting question. As the application moves from a developer’s workstation to a test harness, then to staging, and on to production, the database connection properties can change each time.  What’s more, a separation of responsibilities usually Continue Reading

The Locky Saga Continues: Now Uses .odin as File Extension

As a result of our continuous monitoring of the Locky ransomeware we discovered a new Locky variant. This variant now appends a “.odin” extension to its encrypted files. This is now the third time that the extension has been changed. Aside from this, in this report we will also examine Continue Reading

Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms

This post was authored by Mike Schutz, General Manager, Cloud Platform. Security is a top-of-mind topic for every organization. This is why Microsoft is investing deeply to provide advanced security across our technology portfolio. With the launch of Windows Server 2016 this week, we introduced new advanced multi-layer security capabilities Continue Reading

Zimbra Suite Plus, Part II – Administration , quick overview

In our last blog post, we showed you how to download and install Zimbra Suite Plus. In this blog post, we are going to do a quick overview of the Administration Console and walk through each Zimbra Suite Plus component. Installing the Zimbra Suite Plus License Login into the Admin Continue Reading

Dissecting Mamba, the Disk-Encrypting Ransomware

Another new ransomware has joined the file-encrypting bandwagon. Only this time, instead of choosing what types of files to encrypt, it has decided to join the league of a few others and encrypt the entire disk directly using an open-source tool called DiskCryptor. This is not the first time that Continue Reading

An overview of the Group Replication performance

In this blog post we will present a first look at the performance of Group Replication (GR), now that the RC is out. The goal is to provide some insight on the throughput, latency and scalability one can expect in a modern computing infrastructure, using GR in single- and multi-master Continue Reading

Threat Intelligence Roundup – September 16, 2016

This week’s FortiGuard Threat Intelligence Brief reports on a spike in an Android advertising library, a fake series of banking sites used to phish credentials, as well as a campaign using the old faithful “we couldn’t deliver your package” courier scam. While hackers weren’t quite as active as they were Continue Reading

>