Weekly Threat Briefs

FortiGuard Labs uses its industry leading global infrastructure of threat sensors, honeypots, and collectors to provide you with the largest source of data of any pure play network security vendor. Data is collected from all of these sources on a continual basis and analyzed by Fortinet’s world-wide team of analysts to provide you with a weekly recap of the incidents and threats you care the most about.

On this page you will find an archive of our weekly Threat Intelligence Briefs, as well as the ability to sign up to receive these briefs every Friday. Join the thousands of other security-minded professionals who receive these weekly briefs!

This week, three new speculative execution vulnerabilities were announced, affecting Intel's Software Guard Extensions (SGX) technology. SGX allows programs to establish secure enclaves on Intel processors --- specifically the Kaby Lake and Skylake processors. SGX is an Intel technology for applicat...

Aug 17, 2018
Fortinet has a culture of innovation. It isn't more evident than at the BlackHat conference held this week in Las Vegas, where FortiGuard Labs researcher Kai Lu presented his application behavior monitoring tool called FortiAppMonitor for macOS.

Aug 10, 2018
Once again, Fortinet's membership in the Cyber Threat Alliance (CTA) continues to pay dividends. Sophos, also a CTA member, published their comprehensive research into the SamSam ransomware this week. As part of their CTA membership, Sophos shared all the indicators of compromise (IOCs) with other m...

Aug 03, 2018
Experts have been warning consumers for years about vulnerabilities in home automation solutions, and Hide 'N Seek (HNS) might be the first in-the-wild malware to actively target these vulnerabilities. It is expected that the growth of Internet of Things (IoT) devices will reach 20.4 billion by 2020...

Jul 27, 2018
SCADA/ICS technologies and related IIoT (Industrial Internet of Things) devices have become high-value targets for hackers looking to disrupt business operations, collect ransom, or compromise a rival nation's critical infrastructure. Nearly 60% of surveyed organizations using SCADA or ICS reported...

Jul 20, 2018