Weekly Threat Briefs

FortiGuard Labs uses its industry leading global infrastructure of threat sensors, honeypots, and collectors to provide you with the largest source of data of any pure play network security vendor. Data is collected from all of these sources on a continual basis and analyzed by Fortinet’s world-wide team of analysts to provide you with a weekly recap of the incidents and threats you care the most about.

On this page you will find an archive of our weekly Threat Intelligence Briefs, as well as the ability to sign up to receive these briefs every Friday. Join the thousands of other security-minded professionals who receive these weekly briefs!

On Wednesday, May 16, Fortinet released its Q1 2018 Threat Landscape Report. This report showcases Fortinet's unique perspective on the global threat landscape drawn from our collective research and intelligence culled from billions of threat events and incidents observed across global production en...

May 18, 2018
FacexWorm is spreading! FacexWorm, a malicious Chrome extension, originally detected in August, 2017 has returned. It is currently spreading via Facebook Messenger targeting cryptocurrency trading platforms and utilizing some new vicious tactics. Currently the threat only works in Chrome. 

May 11, 2018
Hidden Cobra Strikes Again! The Hidden Cobra hacking group, also known as Lazarus, has been ramping up global cyber espionage activity as of late. You may recall this team from their Sony Studios hack back in 2014. This current campaign, code-named Operation GhostSecret, appears to have started in M...

May 04, 2018
Operation Power OFF! In a coordinated effort by law enforcement agencies from the United States, the United Kingdom, the Netherlands, Canada, Hong Kong, Serbia, and various other European countries, Europol officials shut down webstresser.org. Webstresser.org was the world's largest DDoS-for-hire se...

Apr 27, 2018
FortiGuard Labs researchers are at it again: enlightening and impactful research. In this case, they focused on the reuse of the Mirai source code that had been leaked to the hacking community in 2016. The researchers' goal was to find malware variants that leveraged the original Mirai source code....

Apr 20, 2018