Fortinet: THREAT LANDSCAPE REPORT Q2
Q2 2019 Introduction and Overview
Welcome back to our quarterly romp through the wild and crazy cyber-threat landscape. Q2 exhibited many themes and trends we’ve seen before, but we encountered plenty of new and noteworthy developments as we poured over intelligence collections. Here’s a brief summary of what’s on the menu for this quarter:
The Fortinet Threat Landscape Index : This barometer of threat activity across the internet hit its highest point ever in Q2 to close 4% higher than this time last year.
Upping the Ante on Anti-analysis : We examine a spam campaign that used novel anti-analysis and evasion techniques and discuss why this trend is one worth following.
Playbook Preview: Zegost : An infostealer active since 2011 has been upgraded with a plethora of capability upgrades. Our analysis will help you avoid being its next victim.
RobbinHood and Its (Un)Merry Men : The ransomware renaissance flourished in Q2 with attacks on Baltimore and other municipalities. Proceeds were not given to the poor.
Exploiting the Digital Supply Chain : Third-party risk is nothing new, but recent incidents exemplify the scope of exposures tied to a growing web of interdependencies.
Exploratory Analysis: Vulnerability Research : 28 zero days, vulnerabilities exploited in the wild, and time to exploitation for new signatures … what more could you want?
RDP and the “BlueKeep” Blues : A spate of RDP vulnerabilities, including the infamous BlueKeep, reminds us that remote access services open a door for criminals too.
Probing Smart Homes and Businesses : Between consumer IoT and ICS is a growing line of smart devices for home and small business use that has threat actors salivating.
The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events observed in live production environments around the world. According to independent research , Fortinet has the largest security device footprint in the industry. This unique vantage point offers excellent views of the cyber-threat landscape from multiple perspectives, and we look forward to sharing highlights from that analysis with you in the pages that follow. See the full report here.
Dell Software Group sold to help fund looming EMC deal
Ingram Micro gets distribution access to Dell’s security range in Australia