Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

5G Implications for Security

Mobile network infrastructures have evolved dramatically over just a few short years. The evolution from 3G to 4G, for example, enabled the mobile infrastructure to deliver new data-centric services to consumer, such as rich multimedia, along with enhanced content capabilities and services. 5G will enhance the power and capacity of mobile Continue Reading

Addressing Known and Unknown Operational Technology Threats

The Fourth Industrial Revolution is a convergence of technologies that is blurring the lines between the physical and digital worlds, known as cyber-physical systems. And it is utterly transforming the technology systems that support things we don’t usually see, like manufacturing, transportation, energy production and distribution, water and waste management, Continue Reading

Multi-cloud Complicates Security

The agility and benefits of cloud computing are undeniable. Forrester predicts that the total global public cloud market will be $178 billion in 2018, up from $146 billion in 2017, and will continue to grow at a 22 percent compound annual growth rate. And IDC forecasts that by 2020, more than 90 Continue Reading

Analysis of the New Modules that Emotet Spreads

Threat Analysis Report from FortiGuard Labs Just a few days ago, FortiGuard Labs published a research blog about a fresh variant of Emotet. When I wrote that blog, I had not yet detected any further malicious actions from its C&C server. However, I have continued to monitor its connections, and Continue Reading

Getting Ready for Swarm-as-a-Service

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared on the ThreatPost website on January 31, 2019. The digital world has created unprecedented opportunities – both for good and for ill. Advances in swarm technology, for example, have powerful implications in the fields of Continue Reading

New Stealth Worker Campaign Creates a Multi-platform Army of Brute Forcers

A Threat Analysis Report from FortiGuard Labs FortiGuard Labs recently discovered a new campaign of StealthWorker malware, also called GoBrut, that was first reported by Malwarebytes just a few days ago. This malware is written in Golang. Although uncommonly seen being used by malware, it is the same programming language Continue Reading

Leveraging UEBA to Address Insider Threats

The rapid adoption of new digital networking strategies has utterly transformed how and where we conduct business. Digital Transformation (DX) is expanding the attack surface, and one of the biggest challenges is extending security to all the places and devices where applications, workflows, and critical data need to travel to Continue Reading

WordPress WooCommerce XSS Vulnerability – Hijacking a Customer Account with a Crafted Image

Overview The FortiGuard Labs team recently discovered a Cross-Site Scripting (XSS) vulnerability in WooCommerce. WooCommerce is an open-source eCommerce platform built on WordPress. According to BuiltWith statistics, WooCommerce is the No. 1 eCommerce platform, owning 22% of global market share in 2018. This XSS vulnerability (CVE-2019-9168) exists in the zoom Continue Reading

Breakdown of a Targeted DanaBot Attack

A FortiGuard SE Team Threat Analysis Report On Feb 5th, 2019, the FortiGuard SE team discovered a targeted attack aimed at an unknown individual working for a governmental organization located in the city of Gold Coast, Australia. Within a span of a few days, we had observed additional activity targeting Continue Reading

>