Fortinet

FortinetSecurity

An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability

Credit to Author: Wayne Chin Yick Low| Date: Sun, 04 Jun 2017 18:52:30 -0700

FortiGuard Labs recently came across a new strain of samples exploiting the CVE-2017-0199 vulnerability. This vulnerability was fixed by Microsoft and the patch was released in April 2017. Due to its simplicity, it can be easily exploited by attackers. It has also been found in-the-wild by other vendors. We have also blogged about some samples recently found in spear phishing attack. While there are plenty of articles discussing this vulnerability, most of them are intended for technical readers and primarily focus on how to create proof-of-concept…

Read More
FortinetSecurity

Digital Transformation in Healthcare and How Fabric Security Solutions Can Assist

Credit to Author: Jonathan Nguyen-Duy| Date: Thu, 01 Jun 2017 06:24:03 -0700

Whether it’s healthcare, or any of the other 16 sectors of critical national infrastructure, enterprises responsible for some of our most important cyber assets are undergoing some sort of digital transformation. At its core, digital transformation in business is really about moving from intuitive to data-driven decision making to gain new insights, provide essential services, and drive exponential growth. Over the past few years, the healthcare sector and other industries have been focused on four major objectives related to digital transformation: Move…

Read More
FortinetSecurity

Byline: Healthcare in the Crosshairs

Credit to Author: Susan Biddle| Date: Thu, 01 Jun 2017 06:22:23 -0700

Healthcare systems are consistently a preferred target of cybercriminals. Today, whenever a cyberattack occurs, healthcare networks seem to be right in the crosshairs. There are reasons for this. Historically, healthcare networks have been reasonablely easy to break into. Despite the implementation of new EHR systems and critical infrastructure for healthcare data exchanges, healthcare generally hasn’t kept up with other vertical markets in terms of security, creating “low-hanging fruit” for would-be attackers. These networks…

Read More
FortinetSecurity

Byline: WannaCry is Part of a Bigger Problem

Credit to Author: James Cabe| Date: Wed, 31 May 2017 08:48:31 -0700

The most important question related to the recent WannaCry attacks isn’t who the attackers were, or how big the attack was. The question is, “How did this happen in the first place?” The vulnerability exploited by this attack had been patched by Microsoft months before. That patch was part of a widely publicized update that was issued in response to the massive set of NSA cyberespionage tools leaked by the secretive group known as Shadow Brokers. Everyone knew about it. Yet, apparently, few did anything about it. Failure…

Read More
FortinetSecurity

Byline: What is Next for Cloud Services in the Federal Space?

Credit to Author: Aamir Lakhani| Date: Mon, 29 May 2017 21:22:20 -0700

Historically, federal agencies have been wary of using public cloud due to security concerns. Yet the agility and cost savings offered by cloud infrastructure is proving to be a major incentive, leading to a recent big push for agencies to re-engage with public cloud providers.  Security is still a central issue, and many agencies are looking at cloud service providers whose products adopt a cloud-first strategy, viewing them either as a firewall in the cloud or as a way to outsource security to the cloud.   However, no one…

Read More
FortinetSecurity

Spear Phishing Fileless Attack with CVE-2017-0199

Credit to Author: Bahare Sabouri and He Xu| Date: Tue, 30 May 2017 16:21:54 -0700

Introduction CVE-2017-0199 is a remote code execution vulnerability that exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploits this vulnerability can take control of an affected system and then install programs, view, change, or delete data, or create new accounts with full user rights. Microsoft issued a patch for this vulnerability April, and most security vendors have published alarms for it. Unfortunately, attacks targeting this vulnerability are still widely being used…

Read More
FortinetSecurity

The Power of Virtual Cell Wi-Fi

Credit to Author: Kaushik Dash, Harish Gnanasambandam, Vikas Banerjee| Date: Tue, 30 May 2017 09:23:26 -0700

Wireless access has not only revolutionized networks. It has profoundly changed our culture. It has transformed how and where we work, how we interact through social media, and how we stay connected with family and friends. The challenge we are now facing is Wi-Fi saturation. Given the number of connected devices online now, and the predictions for exponential growth over just the next few years, we need to ensure that we are building wireless networks that can accommodate both the volume of connections and connected devices coming, the increase…

Read More