Twitter | Search | |
Search Refresh
FortiRusty 13h
is a new . Here, the team focuses on LooCipher’s file encryption mechanism and looks at the possibility of decrypting affected files without paying the ransom.
Reply Retweet Like
FortiRusty 19h
In part I of this blog, the team demonstrated how to unpack the malware, hooking and process injection techniques used by IcedID, as well as how to execute the payload. Take a closer look at the core payload. Part II:
Reply Retweet Like
FortiRusty Aug 23
is a banking trojan which performs web injection on browsers and acts as proxy to inspect and manipulate traffic. The team's analysis is divided into three parts - explore them here:
Reply Retweet Like
Fortinet Aug 19
Ransomware is not going away, and continues to pose a serious threat; serving as a reminder of the importance of prioritizing patching and security education. Read more in our latest threat report:
Reply Retweet Like
Ryan Swisher Aug 16
The latest Threat Intelligence Podcast podcast is live. Listen now to hear the latest on recent threats, and more:
Reply Retweet Like
Garrick Yeehaw Chang Aug 21
Learn about FortiGuard Labs' Threat Landscape Index (TLI), new trends, and more in the latest Threat Intelligence Brief:
Reply Retweet Like
Antonis Proimadis Aug 21
Adversary Playbook: Today our team released a new playbook with analysis, samples, and indicators of compromise on the threat actor group known as Silence Group as part of our role in the Cyber Threat Alliance.
Reply Retweet Like
FortiRusty Aug 22
Recently, during their daily malware analysis, members of the team encountered an unfamiliar Android sample. Read the details on this discovery:
Reply Retweet Like
Kathrin Bachhofer Aug 15
Fortinet’s Threat Landscape Index reached its highest point to date in Q2 of 2019, driven by increased malware and exploit activity. Learn more about the latest trends in ’s new Quarterly Threat Landscape Report:
Reply Retweet Like
Antonis Proimadis Aug 17
The latest podcast is here! Listen now to hear discussions on ZombieLoad, new SandboxEscaper vulnerabilities, and What’s Up 0-Day:
Reply Retweet Like
Kathrin Bachhofer Aug 17
The podcast is out now! Get the latest threat intel from the expert researchers at :
Reply Retweet Like
Antonis Proimadis Aug 20
Here, the team dives into their approach to find logical bugs on an RPC server using RPCView. More info:
Reply Retweet Like
Antonis Proimadis Aug 18
The team has been observing the 'Silence' Cybercrime Gang targeting banks. Find out more about this group in our playbook and as reported by: : via
Reply Retweet Like
Antonis Proimadis Aug 19
. recently captured a fresh variant of embedded in a MS Word document. After quick analysis, we’ll show you how it works on a victim’s machine. See how:
Reply Retweet Like
Antonis Proimadis Aug 23
Since its original release, has lurked in the shadows while infecting machines worldwide. We look into common ransomware techniques used by this , and how it represents the ransomware’s infection routine in general.
Reply Retweet Like