Weekly Threat Briefs

FortiGuard Labs uses its industry leading global infrastructure of threat sensors, honeypots, and collectors to provide you with the largest source of data of any pure play network security vendor. Data is collected from all of these sources on a continual basis and analyzed by Fortinet’s world-wide team of analysts to provide you with a weekly recap of the incidents and threats you care the most about.

On this page you will find an archive of our weekly Threat Intelligence Briefs, as well as the ability to sign up to receive these briefs every Friday. Join the thousands of other security-minded professionals who receive these weekly briefs!

A critical vulnerability has been discovered in the popular peer-to-peer BitTorrnet client application, Transmission. The vulnerability could allow hackers to remotely execute malicious code on BitTorrent user's computers. Google's Project Zero vulnerability report team discovered the flaw and have...

Jan 18, 2018
On January 3rd, Microsoft released Windows security updates to address the recently disclosed Meltdown/Spectre CPU vulnerabilities that are susceptible to side channel attacks that could potentially allow kernel memory processes to be accessed. But installing the Windows security patches got a whole...

Jan 11, 2018
2018 is starting off with quite a bang. Various media reports on January 3rd claimed that Intel processors (specifically x86-64 processors produced in the last decade) are susceptible to side channel attacks that could allow kernel and memory processes to be accessed by an attacker. Intel quickly we...

Jan 04, 2018
Industrial Control Systems (ICS) continue to be a target for hackers. Because ICS platforms affect vital critical infrastructures, they are enticing for nefarious threat actors. Successful attacks can cause significant damage with far-reaching impact. Last week a new ICS attack was discovered that i...

Dec 21, 2017
Cybercriminals are always looking for the easy route to exploit their targets. And why try too hard anyway when poor security hygiene and weak password management make it nearly effortless for them to accomplish their nefarious deeds. Credential theft provides that easier method of gaining access to...

Dec 14, 2017