Fortinet

FortinetSecurity

Teardown of a Recent Variant of Android/Ztorg (Part 1)

Credit to Author: Axelle Apvrille| Date: Wed, 15 Mar 2017 08:20:51 -0700

Ztorg, also known as Qysly, is one of those big families of Android malware. It first appeared in April 2015, and now has over 25 variants, some of which are still active in 2017. Yet, there aren't many technical descriptions for it – except for the initial Ztorg.A sample – so I decided to have a look at one of the newer variants, Android/Ztorg.AM!tr, that we detected on January 20, 2017. The sample poses a "Cool Video Player" and its malicious activity was so well hidden I initially thought I had run into…

Read More
FortinetSecurity

Fortinet Welcomes New Industry-Leading Technology Partners to Our Security Fabric Ecosystem

Credit to Author: John Welton| Date: Tue, 14 Mar 2017 07:22:34 -0700

Today we announced the addition of eight industry-leading information technology providers to our Fortinet Fabric-Ready Partner Program. These new partners further extend the Fortinet Security Fabric across traditional, cloud, virtual, and software-defined environments, while simplifying multi-vendor security deployments for enterprises.

Read More
FortinetSecurity

FortiGuard Labs Telemetry: Round up of 2015 and 2016 IoT Threats (Part 2 Home Routers)

Credit to Author: Gavin Chow| Date: Mon, 13 Mar 2017 08:37:05 -0700

In our last post [Round up of 2016 IoT Threats] we compared 2015 and 2016 global threat telemetry for IoT devices collected by our FortiGuard Labs. In this post, we will examine why home routers had a such a huge increase in IPS signature hits in 2016, when compared to 2015. Home Routers In 2015, home routers had the most IPS signature hits at around 821,000. But this number exploded exponentially in 2016, to more than 25 billion hits. We can see the exponential increase more clearly when we compare both years using a size comparison chart…

Read More
FortinetSecurity

Byline: IoT is Everywhere – Your Security Should Be Too

Credit to Author: Jonathan Nguyen-Duy| Date: Thu, 09 Mar 2017 09:30:43 -0800

IoT security challenges include weak authentication and authorization protocols, insecure software, firmware with hard-coded backdoors, poorly designed connectivity and communications, and little to no configurability. Many devices were developed around chunks of commonly available and largely untested code, compounding security vulnerabilities across thousands of devices sold through dozens of manufacturers. And to make matters worse, IoT devices are often “headless,” with limited power and processing capabilities. This not only means they can

Read More
FortinetSecurity

Microsoft Excel Files Increasingly Used To Spread Malware

Credit to Author: Xiaopeng Zhang| Date: Wed, 08 Mar 2017 15:27:03 -0800

Over the last few years we have received a number of emails with attached Word files that spread malware.  Now it seems that it is becoming more and more popular to spread malware using malicious Excel files. Lately, Fortinet has collected a number of email samples with Excel files attached (.xls, .xlsm) that spread malware by executing malicious VBA (Visual Basic for Applications) code. VBA is a programming language used by Microsoft Office suite. Normally, VBA is used to develop programs for Excel to perform some tasks. I’ll use…

Read More
FortinetSecurity

Byline: The Move to Standardization and Open Architectures Enables Cybersecurity Automation For the Government Sector

Credit to Author: Steve Kirk | Date: Wed, 08 Mar 2017 07:17:56 -0800

In order to remain responsive, resilient, and agile, government organizations must adopt open, integrated, and automated security architectures that enable the collection and sharing of threat intelligence and the ability to coordinate a response to detected threats.

Read More
FortinetSecurity

Byline: Companies Are Taking the Cyber Skills Gap Into Their Own Hands

Credit to Author: Scott Edwards| Date: Tue, 07 Mar 2017 07:24:45 -0800

Businesses are expanding investments in infrastructure security but struggling to source the increasingly rare talent needed to implement and operate their solutions. As an industry-leader, Fortinet believes it is our responsibility to foster the development and continuing education of cybersecurity talent and close the cybersecurity skills gap

Read More