Archive for Fortinet - page 15

Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan

FortiGuard Labs uncovers an attack targeting companies in Taiwan with WinOS4.0 that spreads via official email impersonation. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Life at Fortinet: Thriving through Cross-Functional Collaboration

Pursuing a career in cybersecurity is a smart move. Meet Andra Scott, Customer Marketing Specialist. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Secure By Design: A Continued Priority in 2025 and Beyond

Learn how Fortinet works closely with public and private sector organizations—from government to academia to end users—who all play a critical role in protecting our collective digital infrastructure. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Fortinet Executive Q&A: Driving Growth, Innovation, and Market Leadership in Cybersecurity

Learn insights from Fortinet’s executive leadership on the company’s performance, strategic growth initiatives, and future plans. Read more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Quantum-Safe Encryption: Safeguarding Data for the Quantum Era

Learn how quantum computers threaten current encryption standards and methods to protect your data. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Elevate Your Security Operations with FortiAI

FortiAI, embedded within FortiAnalyzer, is built on over a decade of Fortinet AI innovation and patents. It enhances security operations by automating threat detection, reducing manual workloads, and empowering teams with actionable intelligence—without the inefficiencies or limitations of standalone AI tools. Learn more. Source link…

Continue reading →

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Ransomware Roundup – Lynx

Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 15 of 36 ← First ... 13 14 15 16 17 ... Last →