Threat Signal

The Threat Signal created by the FortiGuard Labs is intended to provide you with insight on emerging issues that are trending within the cyber threat landscape. The Threat Signal will provide concise technical details about the issue, mitigation recommendations and a perspective from the FortiGuard Labs team in an FAQ style format.

Whether it’s significant vulnerability disclosures including high profile zero days, coordinated announcements with Cyber Threat Alliance partners, malware of significance, or any threat making the news cycle, FortiGuard Threat Signals are there for you.

FortiGuard Labs is aware of a report that a new threat actor, "Tortillas," is leveraging the ProxyShell exploit to deliver...

Oct 15, 2021 TLP Level: Threat Level: MED ID: 61
FortiGuard Labs is aware of a report that a new Windows 0-day vulnerability (CVE-2021-40449) was used to download and laun...

Oct 13, 2021 TLP Level: Threat Level: MED ID: 60
FortiGuard Labs is aware of a new, Linux malware family named "FontOnLake." FontOnLake is a very sophisticated malware fam...

Oct 08, 2021 TLP Level: Threat Level: MED ID: 59
FortiGuard Labs is aware of a report that the ransomware threat actor Atom Silo targeted vulnerable Confluence servers to ...

Oct 05, 2021 TLP Level: Threat Level: HIGH ID: 57
Update 10/8 - IPS section appended with newly available IPS signature.Update 10/7 - APPENDIX section updated with announc...

Oct 05, 2021 TLP Level: Threat Level: MED ID: 58
FortiGuard Labs is aware of a report that a Linux variant of RansomExx ransomware's encryption process has a bug leading t...

Oct 01, 2021 TLP Level: Threat Level: HIGH ID: 56