Fortinet Threat Research.
FortiGuard Labs Threat Research Official blog feed of Fortinet
- ShadowV2 Casts a Shadow Over IoT Devices | FortiGuard Labon November 26, 2025 at 2:00 pm
ShadowV2, a new Mirai-based botnet targeting IoT devices, surfaced during the recent AWS outage. FortiGuard Labs examines its propagation, DDoS capabilities, and global footprint.
- Cyberthreats Targeting the 2025 Holiday Season: What CISOs Need to Knowon November 25, 2025 at 2:00 pm
Cybercriminal activity is surging ahead of the 2025 holiday season. Deceptive domains, stolen accounts, and e-commerce attacks are accelerating. Here’s what leaders need to know.
- Cloud Abuse at Scaleon October 31, 2025 at 1:00 pm
FortiGuard Labs analyzes TruffleNet, a large-scale campaign abusing AWS SES with stolen credentials and linked to Business Email Compromise (BEC).
- Stolen Credentials and Valid Account Abuse Remain Integral to Financially Motivated Intrusionson October 30, 2025 at 3:00 pm
FortiGuard IR analysis of H1 2025 shows financially motivated actors increasingly abusing valid accounts and legitimate remote access tools to bypass detection, emphasizing the need for identity-centric defenses.
- Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asiaon October 17, 2025 at 1:00 pm
FortiGuard Labs has tracked a hacker group expanding attacks from Mainland China to Malaysia, linking campaigns through shared code, infrastructure, and tactics.
- New Stealit Campaign Abuses Node.js Single Executable Applicationon October 10, 2025 at 1:00 pm
A new Stealit campaign uses Node.js Single Executable Application (SEA) to deliver obfuscated malware. FortiGuard Labs details tactics and defenses. Learn more.
- The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerouson October 8, 2025 at 1:00 pm
FortiGuard Labs details Chaos-C++, a ransomware variant using destructive encryption and clipboard hijacking to amplify damage and theft. Read more.
- Confucius Espionage: From Stealer to Backdooron October 2, 2025 at 1:00 pm
FortiGuard Labs has uncovered a shift in the tactics of threat actor Confucius, from stealers to Python backdoors, highlighting advanced techniques used in South Asian cyber espionage. Read more.
- SVG Phishing hits Ukraine with Amatera Stealer, PureMineron September 26, 2025 at 1:00 pm
A phishing campaign in Ukraine uses malicious SVG files to drop Amatera Stealer and PureMiner, enabling data theft and cryptomining. Learn more.
- SEO Poisoning Attack Targets Chinese-Speaking Users with Fake Software Siteson September 12, 2025 at 1:00 pm
FortiGuard Labs uncovered an SEO poisoning campaign targeting Chinese users with fake software sites delivering Hiddengh0st and Winos malware.







