Skip to content

PossibleThreat Articles

Articles for the experts…

  • Security
    • Sophos
    • MalwareBytes
    • TrendMicro
    • Microsoft
    • Fortinet
  • Sciences
  • Independent
    • Krebs
    • Wired
    • Securiteam
    • ComputerWorld

Fortinet

Fortinet Security 

Update: Curveball Exploit (CVE-2020-0601) Starts Making the Rounds

January 21, 2020 0 Comments


Lean more about the recent Microsoft Curveball vulnerability and how FortiClient protects Fortinet customers from exploitation.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/iIjPXKQAzq8″ height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Addressing Microsoft’s January 2020 Security Update for CVE-2020-0601

January 15, 2020 0 Comments

Learn more about Microsoft’s January 2020 Security Update for CVE-2020-0601.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/VWgofWAr1zo” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Deep Analysis of New Metamorfo Variant Targeting Customers of Brazilian Financial Organizations

January 15, 2020 0 Comments


Read about a new variant of the Metamorfo malware targeting Brazilian financial organizations, in this analysis from FortiGuard Labs.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/FnAUGO2Q5c4″ height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Predator the Thief: Analysis of Recent Versions

January 6, 2020 0 Comments


FortiGuard Labs has been monitoring a new release of the malware known as Predator the Thief, labeled as version 3.3.4. Read more about its latest set of capabilities in this analysis.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/XhRhMuXC-MM” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

The Curious Case of DeathRansom: Part I

January 2, 2020 0 Comments


Read FortiGuard Labs’ analysis of a new strain of ransomware dubbed DeathRansom.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/rNfW4y_VtUg” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

DeathRansom Part II: Attribution

January 2, 2020 0 Comments


In part two of our DeathRansom blog series, our FortiGuard Labs researchers try to shed light on how this DeathRansom campaign is connected with other campaigns, and who might be behind them.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/MiIeFN4jA-Q” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Introducing BIOLOAD: FIN7 BOOSTWRITE’s Lost Twin

December 27, 2019 0 Comments


Learn more about BIOLOAD, a malware recently attributed to the cybercrime group FIN7.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/9QiJy8dxEOQ” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Seven Critical Vulnerabilities Discovered in Portainer

December 17, 2019 0 Comments


FortiGuard Labs uncovered several vulnerabilities in Portainer, and has been working with the Portainer team to address them. Learn more about each vulnerability in this technical advisory.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/lEt6aibW0kc” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Dissecting Tor Bridges and Pluggable Transport – Part II: How Obfs4 Bridges Defeats Censorship

December 6, 2019 0 Comments


In part two of this series on dissecting tor bridges and pluggable transport, our FortiGuard Labs researcher explores how Tor uses Obfs4 Bridge to circumvent censorship. Learn more.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/3KwghtUyOCs” height=”1″ width=”1″ alt=””/>

Read more
Fortinet Security 

Dissecting Tor Bridges and Pluggable Transport – Part I: Finding the Built-in Tor Bridges and How Tor Browser Works

December 5, 2019 0 Comments


Learn more about how our FortiGuard Labs researchers discovered built-in Tor bridges using reverse engineering.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/PYEh-NxQrZU” height=”1″ width=”1″ alt=””/>

Read more
  • ← Previous
  • Next →

Recent Posts

  • Scammers Unleash Flood of Slick Online Gaming Sites
  • Phishers Target Aviation Execs to Scam Customers
  • Microsoft Fix Targets Attacks on SharePoint Zero-Day
  • Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
  • DOGE Denizen Marko Elez Leaked API Key for xAI

Recent Comments

    Archives

    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019

    Categories

    • BitCoin
    • Blokt
    • ComputerWorld
    • Currency
    • Digital
    • Fortinet
    • Independent
    • Krebs
    • MalwareBytes
    • Microsoft
    • News
    • QuickHeal
    • Science
    • Securiteam
    • Security
    • Sophos
    • Technology
    • TrendMicro
    • Wired
    Copyright © 2025 PossibleThreat Articles. All rights reserved.
    Theme: ColorMag by ThemeGrill. Powered by WordPress.