FortiGuard Labs Threat Research
A technical analysis of the ongoing ValleyRat multi-stage malware campaign's diverse techniques and characteristics.
FortiGuard Labs Threat Research
FortiGuard Labs examined several attacks targeting Cacti and Realtek vulnerabilities. Understand the payloads of these attacks and their resulting behavior of spreading ShellBot and Moobot malware.
FortiGuard Labs Threat Research
Cybercriminals are big proponents of getting the most out of their resources. Read how FortiGuard Labs researchers investigated how they're retrofitting code to enable more successful criminal outcomes.
FortiGuard Labs Threat Research
Read how the FortiGuard Labs team discovered another 0-day attack in the PyPI packages (Python Package Index) by the malware authors 'Portgual' and 'Brazil'.
Recently, FortiGuard Labs provided evidentiary support to INTERPOL and African Member countries as part of the Africa Cyber Surge Operation to help detect, investigate, and disrupt cybercrime. Learn more.
FortiGuard Labs Threat Research
FortiGuard Labs discovered an Excel document, which exploits CVE-2017-11882 to execute malicious code to deliver and execute malware. Part two of this series reveals more about the Redline payload and the information it steals from victims.
Explore the fundamentals of cyber risk management with key questions CISOs should be asking to successfully manage risk and help their organization avoid breaches.
A Smart Industry report highlights OT security strategies that CISOs can employ to support their digital transformation efforts while guarding against evolving cyber threats. Read to learn more.
FortiGuard Labs Threat Research
FortiGuard Labs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of the Rozena malware, capable of injecting a remote shell connection back to the attacker’s machine to deploy a fileless attack. Read more.
FortiGuard Labs Threat Research
FortiGuard Labs discovered version 3.0 of IceXLoader, a new malware loader. Read our blog for the technical details of how it behaves and the potential malware that it can deliver in an infected system.