Archive

We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is

SWIFT said yesterday that there are no signs of foul play in its network or messaging systems following last week’s data dump by the Shadow Brokers. Shadow Brokers released several Windows exploits, which were allegedly stolen from the NSA and

A new dark web ransomware-as-a-service (RaaS) has been uncovered by security researchers, which according to experts, is selling a new ransomware variant called “Karmen”. The customised ransomware is being sold by a Russian-speaking cybercriminal “DevBitox,” who goes by the username

If you’ve installed Windows 10, or bought Microsoft Office, or set up an Outlook email address, chances are you’ve got a Microsoft account. This hub ties together everything you do with Microsoft’s software, from Cortana to OneDrive. With so much

The hacker group calling itself “Shadow Brokers” has made public another batch of files allegedly obtained from the NSA-linked threat actor tracked as the Equation Group. Microsoft has assured customers that these new exploits don’t affect up-to-date systems. The Shadow

Files released by the mysterious hacker Shadow Brokers suggested Friday the US National Security Agency had penetrated the SWIFT banking network and monitored a number of Middle East banks. The files, according to computer security analysts, also showed the NSA

The data backup market is changing fast. Here are five vendors leading the transformation. The backup and recovery market has become a crowded space, with hundreds of vendors vying for market share. At the higher end of the market, the

As Ron Kehoe wrapped up his Data Center World session about Network Security Policy Management (NSPM) this past Wednesday, an attendee, sounding as though he had just learned about the Holy Grail of security, asked: “And, this technology is available

Training Courses

Technical Training Courses Looking for a course that fits your particular needs? Browse a catalog of the courses offered through the Fortinet NSE Institute where you’ll be able to select and learn more about any of the courses they offer.  

Threat landscape

The FortiGuard Labs threat research team analyzed real-world threat data from around the globe to create this insightful report. It not only shares findings on the most prevalent exploits, malware, and botnets, but offers observations on threat variance by region

Google this week released security updates for Android to resolve numerous Critical remote code execution (RCE) and elevation of privilege (EoP) vulnerabilities in the platform. Over 100 vulnerabilities were resolved in Android this month, split into two separate sets of

There are more than three dozen previously unknown flaws that pose a potential threat to consumers using some Samsung TVs, watches and phones, a security researcher reported Monday. Hackers could exploit the vulnerabilities found in Samsung’s Tizen operating system to