LooCipher: Can Encrypted Files Be Recovered From Hell?

LooCipher is a new ransomware being distributed in the wild. While there have been articles discussing its main behaviour, how this new ransomware is being spread, and how it communicates with its command and control server to send victim machine information, this blog will focus on LooCipher’s file encryption mechanism Continue Reading

Detailed Analysis of macOS Vulnerability CVE-2019-8507

FortiGuard Labs Threat Analysis Report on an Memory Corruption Vulnerability in QuartzCore while Handling Shape Object. On March 25, 2019, Apple released macOS Mojave 10.14.4 and iOS 12.2. These two updates fixed a number of security vulnerabilities, including CVE-2019-8507 in QuartzCore (aka CoreAnimation), which I reported to Apple on January 3, Continue Reading

Speed up your ROS snap builds

A while back I wrote a post about distributing a ROS system among multiple snaps. If you want to enable some sort of add-on story, you need to have multiple snaps, and that remains the way to do it today with ROS. That approach works, but I’ll be the first Continue Reading

Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

eCommerce strategies with SMS and MMS for Valentine’s Day

While Christmas feels very recent, there’s another high sales date coming soon – Valentine’s Day! Get those lovebirds into a long-term relationship with your business with savvy eCommerce strategies. It’s time to prepare your big Valentine’s Day sales events while consumers get ready to spend generously ahead of Valentine’s Day. Continue Reading

Power, Performance and the Cloud

While the continued growth of the cloud is assured, there seems to be little evidence that there will be a lot of organizations that will be moving their entire infrastructure into the public cloud anytime soon. What we will be seeing is a dramatic growth in hybrid network architectures. Which Continue Reading

Replication Features in MySQL 8.0.2

MySQL 8 is shaping up quite nicely. And we are having a blast in the MySQL replication team while this is happening. We are continuously improving all-things-replication by introducing new and interesting features. In addition, we have been listening to our community and addressing their feedback. As such, we would Continue Reading

FortiGuard Labs Telemetry – Cloud Application Usage Observations

Many internet moons ago, it was the norm to fix a cup of coffee while waiting for a 1-megabyte file download to complete. Innovators and early adopters of cloud storage at that time were faced with the challenge of limited internet bandwidth capacities and expensive leased lines. Storing and syncing Continue Reading

Token Authentication for Cached Private Content and APIs

While working to make the Internet a better place, we also want to make it easier for our customers to have control of their content and APIs, and who has access to them. Using Cloudflare’s Token Authentication features, customers can implement access control via URL tokens or HTTP request headers Continue Reading

Financial Services Cybersecurity Checklist: Staying Ahead of the Curve

Today’s financial organizations need to be able to conduct business in real-time while also protecting against cybercriminals that are targeting the highly-valuable data they possess. This is a tall task that requires dedicated staff and resources. But, where should you start? We’ve put together this financial services cybersecurity checklist to Continue Reading

>