Cyberattacks involving ransomware are a growing threat to organizations worldwide in the digital age. One recent incident that has captured global attention is the MGM cyberattack. As one of the largest entertainment companies in the world, MGM’s security breach has raised concerns about data protection and cybersecurity measures across industries. In this article, we aim …
Continue reading “Everything we know about the MGM Cyberattack”
Cyber Defence Sensors: Enhancing Security in the Digital Sphere In an increasingly interconnected digital world, where cyber threats pose a significant risk to individuals, businesses and governments alike, the need for robust cyber defence measures has never been more pressing. Cyber defence sensors have emerged as powerful tools in identifying and mitigating these threats, allowing organizations …
In today’s digital age, the benefits of modern technology are undeniable for businesses. However, with these advancements come risks, particularly concerning privacy and security. Commercial spyware is concerning because it can be used to illegally obtain sensitive information or spy on individuals without their consent. This poses a threat to privacy and security. In this …
In the modern world, cyber-security threats are becoming more than a nuisance. They have become a real danger for organizations everywhere, with internal cybersecurity threats being among the biggest issues to worry about. With so many staff members and employees now connected to a network in some way or another as well as giving access …
Continue reading “Preventing internal cybersecurity threats”
Endpoint security is the general term for protecting your organization’s computer endpoints. This includes computers, laptops, tablets, smartphones and other devices that individual users connect to the network. Endpoint security can include several different technologies used to secure your company’s computer endpoints. From password management and two-factor authentication to application whitelisting and virtualization controls…endpoint security …
Continue reading “Endpoint Detection and Response (EDR) Security”
It’s no secret that cybercriminals are constantly trying to improve their methods of targeting victims. As a result, they have also come up with more creative ways of extorting money from their victims. The most common variants of ransomware these days attack the users by asking for payment in exchange for unlocking files and restoring …
A distributed denial-of-service attack, or DDoS attack, is when hackers use multiple computers or bots to send requests to a website simultaneously. This overload causes legitimate users who try to access the site to have trouble and slow it down. If you’re a website owner and your visitors can’t get through on one page or …
Continue reading “What is a distributed denial-of-service (DDoS) attack?”
UCaaS is a cloud-based communication platform that gives businesses the ability to have unified communications with their employees. It’s essentially a virtual communication system, and it’s ideal for small businesses who need an easy-to-use solution to communicate with their employees but don’t have the resources or staff to maintain a traditional phone system. With UCaaS, …
Continue reading “Unified Communications as a Service (UCaaS) “
Forrester Research analyst John Kindervag came up with the zero trust network model in 2010 while a principal analyst at the firm. It is now twelve years later that corporate leaders worldwide are increasingly embracing zero trust as the technologies that facilitate it reaches the mainstream. The pressure to protect enterprise systems and data increases, …
Continue reading “Zero Trust: A Model for More Effective Security”
A new era of cyberwarfare For many years, Russia has been known to harbour malicious actors who undertake endless cyber Attacks on North American digital property. From industrial plants, medical facilities and education institutions, nothing of off limits for these highly skilled, rogue operators. Even after instructions from Russian government to handover any cybercriminals these …
Onedrive Security Features & Review Does Onedrive come with reliable security? All Onedrive users are extended both two factor authentication and also the ability to access Personal Vault which will further safeguard data with a variety of settings for added protection. Encryption is offered to all users but it’s not considered impenetrable as data transfer …
This week Fortinet released our latest Quarterly Threat Landscape Report. Every second of every day FortiGuard Labs is collecting data gathered from millions of devices and sensors around the world. The sheer volume of data we analyze gives us a distinct and unparalleled perspective of the global threat landscape. This data cumulates into our quarterly …
Continue reading “Activity Summary – Week Ending November 16, 2018”
The TrickBot malware family has been around for many years, initially focused on stealing victim’s online banking credentials. However, FortiGuard Labs has analyzed some new samples where we have found TrickBot, utilizing a new module, has evolved to much more trickery.
Cybercrime-as-a Service has created an entry point for novice distributed denial-of-service (DDoS) attackers by offering simple options to anonymously attack nearly any website and forcing it offline. Due to the public release of source code for some popular bots, building a botnet to provide these sort of services is easier than ever. Minor modifications to …
Continue reading “Activity Summary – Week Ending November 2, 2018”
Attackers have always been seeking new avenues for exploitation; short of discovering zero days themselves. Many attackers have relied on known vulnerabilities either disclosed responsibly or irresponsibly to a vendor. Also, even if there is a patch available, such as the industry standard Patch Tuesday cycle by Microsoft/Adobe, attackers have taken said patches from vendors …
Continue reading “Activity Summary – Week Ending October 26, 2018”
FortiGuard Labs recently encountered malicious traffic traveling to a C2 server located in China. The connection was established by a domain using a name that closely resembled one of Japan’s most famous express post delivery services. Our analysis showed that the website making this connection is fake, there is no SSL certificate, and the page …
Continue reading “Activity Summary – Week Ending October 5, 2018”
VPNFilter, a multi-stage modular framework that has infected hundreds of thousands of network devices around the world, has been discovered to have even greater capabilities than originally profiled. Announcing their findings through the Cyber Threat Alliance, Cisco’s Talos provided early awareness and early sharing of IOCs with the CTA members. Seven additional third-stage modules that …
Continue reading “Activity Summary – Week Ending September 28, 2018”
Once again the Cyber Threat Alliance (CTA) members have collaborated on research. This week the CTA members released a collaborative report on illicit cryptomining (aka cryptojacking). Fortinet is a founding member of the CTA and believe that working together with other cybersecurity organizations, we can improve cybersecurity across our global digital ecosystem. Below is a …
Continue reading “Activity Summary – Week Ending September 21, 2018”
Get patching! For September Patch Tuesday Microsoft released updates addressing 61 vulnerabilities! Severity breakdown is: 17 rated critical, 43 rated important, and only one is rated as moderate. There were several Adobe updates as well.
A new banking Trojan has been identified targeting major Brazilian banking customers, as well as public sector organizations. This malware, code-named CamuBot, uses interesting new tactics with social engineering and malware techniques to bypass security controls, including strong authentication.
For years there have been tools developed for malware research with a primary focus on the Windows platform, whereas tools for alternative operating systems, such as Linux and macOS, were few and far between. This made sense given the enormous adoption rate and market share that Windows operating systems had over the past several decades. …
Continue reading “Activity Summary – Week Ending August 24, 2018”
Hikvision has become aware of a vulnerability involving its video surveillance products that could potentially present a cybersecurity risk. In the interest of protecting our customers from any potential cybersecurity threats, Hikvision has proactively corrected the vulnerability in the latest version of its firmware. We advise all users of the affected cameras to download the …
Fortinet has a culture of innovation. It isn’t more evident than at the BlackHat conference held this week in Las Vegas, where FortiGuard Labs researcher Kai Lu presented his application behavior monitoring tool called FortiAppMonitor for macOS.
Once again, Fortinet’s membership in the Cyber Threat Alliance (CTA) continues to pay dividends. Sophos, also a CTA member, published their comprehensive research into the SamSam ransomware this week. As part of their CTA membership, Sophos shared all the indicators of compromise (IOCs) with other members before they published their findings. This allows CTA members …
Continue reading “Activity Summary – Week Ending August 3, 2018”
Experts have been warning consumers for years about vulnerabilities in home automation solutions, and Hide ‘N Seek (HNS) might be the first in-the-wild malware to actively target these vulnerabilities. It is expected that the growth of Internet of Things (IoT) devices will reach 20.4 billion by 2020, and a growing segment of these devices are …
Continue reading “Activity Summary – Week Ending
July 27, 2018″
Cybercriminals are always looking for the easy route to exploit their targets. And why try too hard anyway when poor security hygiene and weak password management make it nearly effortless for them to accomplish their nefarious deeds.