Recently, we found a simple malicious downloader that downloads a fake PDF file. Unlike a normal malicious loader that integrates the PE Loader code into its binary, this loader has stripped this part and has turned to fetching it online.
Our...
It has recently been brought to light that Lenovo has been shipping a software known as VisualDiscovery by a company called Superfish with their consumer notebook products. This software is apparently not shipped with business laptops.
According to...
Recently, we have been receiving samples that use “decoys” to imitate what is to be expected from running a normal file. In this blog post, we will analyze one such sample that Fortinet detects as W32/Kryptik.CWXI!tr.
Execution
The samp...
Recently, a new malware for iOS devices was discovered apparently part of the Pawn Storm operation. We've investigated.
Update 2015/02/19:
The BuildMachineOSBuild is actually shared with 9 other Mac devices, so the author may have been wor...
The good, the bad, and the ugly of the last week
It’s been quite a week for cybersecurity as Anthem worked through the fallout from their massive data breach the week before, the federal government upped the ante on cybercrime, and Facebook im...
After having spent the past few months trying to get myself acquainted with the world of SCADA, it was time to look into the history of attacks it has been subject to.
For the uninitiated, SCADA (Supervisory Control And Data Acquisition) is the term...
A lot of people know me for my perspectives on ed tech, but lately, I’ve started down the security rabbit hole. And it goes pretty deep.
Ed tech has been a passion of mine for a long time. I started writing about it years ago to make some extr...
Many organizations are moving to virtualized and cloud-based infrastructure. The potential benefits are well-proven, but security is just as important as in physical and on-premises environments.
In early 2014, Gartner reported that over 50% of all...
Hours before we learned about what may become the largest healthcare-related data breach in history, I posted a blog on vulnerabilities in our healthcare systems.
On Wednesday, the second largest health insurance company in the United States announc...
Our healthcare systems, from EHR to medical devices, are more vulnerable than many of us realize. And the stakes are too high to ignore.
Even within the healthcare industry, few people realize just how vulnerable many of our systems are to cyberatta...
As VMware is hosting their annual Partner Exchange 2015 event this week and Fortinet just had our own successful Global Partner Conference a few weeks back, it is timely to reflect on the progress over the years in aligning virtualization and securit...