A Peculiar Case of Orcus RAT Targeting Bitcoin Investors

FortiGuards Labs has spotted a new phishing campaign that targets bitcoin investors by offering Gunbot, a relatively new bitcoin trading bot application. However, instead of being a tool designed to ensure more profit, it serves an Orcus RAT malware that result in the loss of investments and more. Powered by WPeMatico

Read more
Executive Insights: The Evolution of Threat Intelligence

The entire security arms race between IT professionals and cybercriminals is really about one side constantly trying to outsmart the other. Security isn’t just about tools. It’s also about the intelligence that powers them. Which is why when we started Fortinet 16 years ago we were every bit as committed to developing security intelligence and […]

Read more
Ph0wn: The 1st CTF of Smart Devices is Over!

Ph0wn, a CTF dedicated to smart devices, is over! It was a real success, with ~70 participants for this first editions. 16 teams of (a max of) 5 lined up for the competition. 11 teams managed to score in at least one challenge – we are sorry for the 5 remaining teams, but hope they had fun nevertheless. Of course, […]

Read more
The Importance of Operational Technology (OT) Systems to Maintain a Secure Standard of Living in Today’s Modern Society

The Operational Technology (OT) networks (such as industrial control and supervisory control and data acquisition systems [ICS/SCADA]) that run today’s modern society are a collection of devices designed to work together as an integrated and homogenous system. If one of these systems fails, it can have a catastrophic domino effect. For example, electricity requires telecommunications […]

Read more
Securing Customers’ Physical and Virtual Networks with a SIEM Platform

To keep up with this threat landscape, your customers’ IT teams require security solutions that can provide real-time visibility into network activity and regulatory compliance, as well as automatically initiate a response to security events, to increase the overall efficiency of IT management teams. In order to effectively manage network security, compliance, and performance, your […]

Read more
Executive Insights: Changing Cybersecurity Regulations that Global Financial Services Firms Need to Know About

Globally operating financial services firms have to be aware of new cybersecurity regulations and how they affect their business in order to navigate data rules and remain compliant, especially as they conduct business across borders. Compliance is especially crucial as the punishments for noncompliance typically include large fines. Below are some of the most recent […]

Read more
Hacker from Samara city sentenced for Creating and Selling Malware

Sergei Materov, a 42-year old hacker from Samara, the sixth largest city in Russia, has been sentenced at the Prikubansky District Court of Krasnodar for creating and distributing malicious computer programs , under part 2 of article 273 of the Criminal Code of Russian Federation. According to the local news report, the malware created by […]

Read more
Larceny of $70 million from the largest crypto-mining marketplace

The notice announcing “service unavailable” as well as an official press release was displayed on the website of the Slovenian digital currency mining firm NiceHash, which it said endured a hack of its Bitcoin wallet on the seventh of December.  In a video update that streamed live on Facebook, the CEO and co-founder Marko Kobal […]

Read more
Political unrest in SE Asia fertile ground for cyber hackers

An escalating strife and skirmish in the south-east Asian political landscape have given an unabetted passage for the cyber hacking forces to operate without any hindrance which will not die down in near future if the cybersecurity agencies are to be believed.The imminent target for this global gang of cybercriminals is India and Hong Kong […]

Read more