The Hidden Challenge of the Cloud Security Skills Gap

The need for talented IT professionals remains a top concern for most organizations. According to one recent report, organizations say they currently face skills shortages across a range of IT specialties, including server/systems administration (43%), general network administration (36%), and database administration (31%). The lack of seasoned cybersecurity professionals is Continue Reading

Attack Patterns Uncover Defensive Strategies

This is a summary of an article written for ThreatPost by Fortinet’s Global Security Strategist, Derek Manky. The entire article can be accessed here. In Fortinet’s Q1 2019 Threat Landscape Report, threat analysts at FortiGuard Labs chose to dig into data from the company’s web filtering service. Here is what they Continue Reading

LooCipher: Can Encrypted Files Be Recovered From Hell?

LooCipher is a new ransomware being distributed in the wild. While there have been articles discussing its main behaviour, how this new ransomware is being spread, and how it communicates with its command and control server to send victim machine information, this blog will focus on LooCipher’s file encryption mechanism Continue Reading

A Deep Dive Into IcedID Malware: Part I – Unpacking, Hooking and Process Injection

IcedID is a banking trojan which performs web injection on browsers and acts as proxy to inspect and manipulate traffic. It steals information, such as credentials, from victims. It then sends that stolen information to a remote server. Recently, the FortiGuard Labs team started to investigate some IcedID samples. In this Continue Reading

Defining the SD-Branch

One of the most important aspects of digital transformation is that it is a continual process. And most people don’t realize that it has been underway for several years, probably beginning when organizations decided to let users have access to the internet. Since then there have been several huge transformational Continue Reading

BianLian: A New Wave Emerges

FortiGuard Labs Breaking Threat Research Recently, during our daily malware analysis routine, members of the FortiGuard Labs team encountered an Android sample that did not look familiar.  Analysis At a first look, it seemed clear that the APK was heavily obfuscated, and was possibly packed using some technique we had Continue Reading

Cybersecurity Integration: A Q&A with Fortinet’s Phil Quade

Fortinet’s CISO, Phil Quade, recently sat down for an interview with Dan Woods from Early Adopter Research to discuss top of mind trends for CISOs today. Here are a few brief edited excerpts. Click here to read or listen to the entire interview. You have next generation firewalls, which is Continue Reading

Undocumented Excel Variable Used in Malicious Spam Run Targeting Japanese Users

Over the course of the past few months, the FortiGuard SE group has been utilizing and enhancing the Fortinet machine learning systems to detect emerging threats. Recently, one of those machines detected an anomalous spike that led us to discover a malware campaign that had been using social engineering techniques Continue Reading

>