Latest News
- Best Practices to Follow This Safer Internet DayCreating an online presence can open the door for various cyberthreats, from social engineering attacks to data breaches. Consider these tips for staying safe online this Safer Internet Day.
- Improve Digital Experience with Advanced SD-WAN Monitoring from FortinetRead how FortiMonitor provides a holistic SaaS-based monitoring solution to help operation teams address monitoring challenges and consolidate monitoring and incident management.
- OT Cybersecurity Challenges for Leaders to Address in 2023Tackle the prominent security challenges head-on with the right approach and solutions. Get recommendations to best handle them and secure your organization.
- Supply Chain Attack by New Malicious Python Package, “web3-essential”FortiGuard Labs team discovers another 0-day attack in a malicious PyPI package called “web3-essential”. See how this malware avoids suspicion and other observations.
- Ransomware Roundup – Trigona RansomwareIn this week's Ransomware Roundup, FortiGuardLabs covers Trigona ransomware along with protection recommendations. Read the blog to find out more.
- Building Collaboration and Community Through Unique Golf ExperiencesStrong cybersecurity requires collaboration and community. See how Fortinet brings both together to build and connect a community of cyber leaders.
- Analyzing Malware Code that Cryptojacks System to Mine for Monero CryptoFortiGuard Labs analyzes malicious code found in captured excel documents that cryptojacks a victim’s system to mine for Monero cryptocurrency. See how the malicious software is delivered, executed, and the techniques it uses to gain persistence on a device.
- Increasing Access to Fortinet Cybersecurity Training’s Top Level of CertificationTo help address the growing talent shortage, Fortinet is expanding access to its Network Security Expert (NSE) Level 8 Certification by making it entirely available through online proctored exams.
- The Top Benefits of Zero Trust for PartnersThere are a lot of benefits of zero trust, both technical and practical. Here are seven benefits of zero trust for partners as well as best practices for using ZTNA to create business opportunities.
- Ransomware Response Checklist: A Guide for CISOsWhat are the key elements of an effective ransomware attack response plan? Our guide explains with a simple 11-point ransomware response checklist.
Top Attack Countries 1-Day
Top Attack Source IP 1-Day
Top Attack Type 1-Hour
No. | Item | Percent |
Top Countries Attack Originated 1-Hour
No. | Item | Percent |
Top Attack Source IP 1-Hour
No. | Item | Percent |

Statistics From Starlight Intel TDR