The Curious Case of DeathRansom: Part I
Read FortiGuard Labs’ analysis of a new strain of ransomware dubbed DeathRansom.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/rNfW4y_VtUg” height=”1″ width=”1″ alt=””/>
RSS Reader for Computer Security Articles
Read FortiGuard Labs’ analysis of a new strain of ransomware dubbed DeathRansom.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/rNfW4y_VtUg” height=”1″ width=”1″ alt=””/>
In part two of our DeathRansom blog series, our FortiGuard Labs researchers try to shed light on how this DeathRansom campaign is connected with other campaigns, and who might be behind them.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/MiIeFN4jA-Q” height=”1″ width=”1″ alt=””/>
Learn more about BIOLOAD, a malware recently attributed to the cybercrime group FIN7.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/9QiJy8dxEOQ” height=”1″ width=”1″ alt=””/>
FortiGuard Labs uncovered several vulnerabilities in Portainer, and has been working with the Portainer team to address them. Learn more about each vulnerability in this technical advisory.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/lEt6aibW0kc” height=”1″ width=”1″ alt=””/>
In part two of this series on dissecting tor bridges and pluggable transport, our FortiGuard Labs researcher explores how Tor uses Obfs4 Bridge to circumvent censorship. Learn more.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/3KwghtUyOCs” height=”1″ width=”1″ alt=””/>
Learn more about how our FortiGuard Labs researchers discovered built-in Tor bridges using reverse engineering.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/PYEh-NxQrZU” height=”1″ width=”1″ alt=””/>
Learn about the cyber threats uncovered during the week of November 22, 2019.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/Ieoz-mz1d8k” height=”1″ width=”1″ alt=””/>
Read MoreLearn more about a recent spam campaign that has been targeting IT services, manufacturing, and healthcare organizations by impersonating a number of government agencies from a variety of countries.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/NJCEHVdKKSs” height=”1″ width=”1″ alt=””/>
Read More