Weekly Threat Briefs

FortiGuard Labs uses its industry leading global infrastructure of threat sensors, honeypots, and collectors to provide you with the largest source of data of any pure play network security vendor. Data is collected from all of these sources on a continual basis and analyzed by Fortinet’s world-wide team of analysts to provide you with a weekly recap of the incidents and threats you care the most about.

On this page you will find an archive of our weekly Threat Intelligence Briefs, as well as the ability to sign up to receive these briefs every Friday. Join the thousands of other security-minded professionals who receive these weekly briefs!

Today, almost any discussion about any subject won't go on for long before the current pandemic is brought up in some way. It impacts our lives in many ways. Of course, life must go on, and business does continue. But not in the same ways. Companies have had to review their business models and adapt...

Nov 20, 2020
In 2020, we saw rapid changes on a global scale as organizations attempted to adapt to a new normal caused by the pandemic. Amid this shift, there were significant developments seen across the cyber-threat landscape. Going into 2021 and beyond, we face another significant shift with the rise of new...

Nov 13, 2020
In our increasingly digital world, the threat landscape is rapidly changing and expanding, leaving organizations to wonder how they can keep up with evolving threats. This is especially true as cyber criminals swiftly take advantage of new threat vectors and use global events as lures. To provide so...

Nov 06, 2020
Last week's Threat Intelligence Brief explored the takedown attempts orchestrated by Microsoft against TrickBot. Despite all these efforts, researchers discovered how the developers behind TrickBot adapted portions of their code to Linux to increase the scope of possible targets. The detailed findin...

Oct 30, 2020
TrickBot is a malware family first captured and analyzeed by FortiGuard Labs back in 2016. TrickBot is a module-based malware that can extend its capabilities by downloading new modules from its command-and-control (C&C) server and executing them on its victim's device. While it was initially identi...

Oct 23, 2020