Submit Search
Upload
Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends
•
0 likes
•
777 views
AI-enhanced title
M
MNCERT
Follow
Gavin Chow - Fortinet
Read less
Read more
Technology
Report
Share
Report
Share
1 of 26
Recommended
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
SurfWatch Labs
Derek Weeks, Keynote, All Day DevOps 830am GMT
Derek Weeks, Keynote, All Day DevOps 830am GMT
Derek E. Weeks
Артем Зиненко. Vulnerability Assessment в ICS на основе информации из публичн...
Артем Зиненко. Vulnerability Assessment в ICS на основе информации из публичн...
Kaspersky
Cryptographic misuse in android applications
Cryptographic misuse in android applications
Aashish R
Cryptographic misuse
Cryptographic misuse
Aashish R
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
Kaspersky
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
Investorideas.com
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
Amazon Web Services
Recommended
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
SurfWatch Labs
Derek Weeks, Keynote, All Day DevOps 830am GMT
Derek Weeks, Keynote, All Day DevOps 830am GMT
Derek E. Weeks
Артем Зиненко. Vulnerability Assessment в ICS на основе информации из публичн...
Артем Зиненко. Vulnerability Assessment в ICS на основе информации из публичн...
Kaspersky
Cryptographic misuse in android applications
Cryptographic misuse in android applications
Aashish R
Cryptographic misuse
Cryptographic misuse
Aashish R
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
Kaspersky
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
Investorideas.com
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
Amazon Web Services
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
Kevin Sutter
Fortinet Broşür
Fortinet Broşür
Güney Bilişim
Fortinet k
Fortinet k
mrehan2k2
Meraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk Phantom
Joel W. King
XSS filter on Server side
XSS filter on Server side
cuteboysmith
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
jimliddle
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
Nati Shalom
How to Make Istio Work with Your App
How to Make Istio Work with Your App
KarenBruner
How to Make Istio Work with Your App
How to Make Istio Work with Your App
StackRox
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
Marina Krotofil
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
CAST
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
Альбина Минуллина
Firepower ngfw internet
Firepower ngfw internet
Rony Melo
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Matt Raible
TechEvent Eclipse Microprofile
TechEvent Eclipse Microprofile
Trivadis
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
Highly dependable automotive software
Highly dependable automotive software
Alan Tatourian
OGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA Support
marpierc
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Alejandro Daricz
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNCERT
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNCERT
More Related Content
Similar to Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
Kevin Sutter
Fortinet Broşür
Fortinet Broşür
Güney Bilişim
Fortinet k
Fortinet k
mrehan2k2
Meraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk Phantom
Joel W. King
XSS filter on Server side
XSS filter on Server side
cuteboysmith
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
jimliddle
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
Nati Shalom
How to Make Istio Work with Your App
How to Make Istio Work with Your App
KarenBruner
How to Make Istio Work with Your App
How to Make Istio Work with Your App
StackRox
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
Marina Krotofil
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
CAST
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
Альбина Минуллина
Firepower ngfw internet
Firepower ngfw internet
Rony Melo
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Matt Raible
TechEvent Eclipse Microprofile
TechEvent Eclipse Microprofile
Trivadis
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
Highly dependable automotive software
Highly dependable automotive software
Alan Tatourian
OGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA Support
marpierc
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Alejandro Daricz
Similar to Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends
(20)
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
Fortinet Broşür
Fortinet Broşür
Fortinet k
Fortinet k
Meraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk Phantom
XSS filter on Server side
XSS filter on Server side
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
How to Make Istio Work with Your App
How to Make Istio Work with Your App
How to Make Istio Work with Your App
How to Make Istio Work with Your App
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
Firepower ngfw internet
Firepower ngfw internet
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
TechEvent Eclipse Microprofile
TechEvent Eclipse Microprofile
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
Highly dependable automotive software
Highly dependable automotive software
OGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA Support
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
More from MNCERT
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNCERT
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNCERT
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not to
MNCERT
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet Healthiness
MNCERT
MNSEC 2018 - Malware Distribution Trends, October 2018
MNSEC 2018 - Malware Distribution Trends, October 2018
MNCERT
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
MNCERT
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
MNCERT
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardening
MNCERT
MNSEC 2018 - Cryptography
MNSEC 2018 - Cryptography
MNCERT
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORT
MNCERT
MNSEC 2018 - Data center security
MNSEC 2018 - Data center security
MNCERT
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchain
MNCERT
More from MNCERT
(12)
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Malware Distribution Trends, October 2018
MNSEC 2018 - Malware Distribution Trends, October 2018
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardening
MNSEC 2018 - Cryptography
MNSEC 2018 - Cryptography
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - Data center security
MNSEC 2018 - Data center security
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchain
Recently uploaded
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Recently uploaded
(20)
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends
1.
© Copyright Fortinet
Inc. All rights reserved. FortiGuard Labs Threat Landscape Highlights MNSEC 2018
2.
© Copyright Fortinet
Inc. All rights reserved. 2018 Threat Landscape Predictions FortiGuard Labs
3.
3
4.
4
5.
5
6.
6
7.
© Copyright Fortinet
Inc. All rights reserved. FortiGuard Labs Threat Telemetry Global and Mongolia – 2018 (Thus Far)
8.
8 0 10,000 20,000
30,000 40,000 50,000 60,000 70,000 80,000 APACHE.STRUTS.2.JAKARTA.MULTIPART.PARSER.CODE.EXECUTION GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION MS.IIS.WEBDAV.PROPFIND.SCSTORAGEPATHFROMURL.BUFFER.OVERFLOW PHP.CGI.ARGUMENT.INJECTION PREVALENCE Top 5 Prevalent Attacks – Global
9.
9 0 5,000 10,000
15,000 20,000 25,000 30,000 35,000 ADWARE/AGENT VBA/AGENT.3E09!TR.DLDR RISKWARE/AGENT VBA/TROJANDOWNLOADER.JAC!TR MSOFFICE/CVE_2017_11882.B!EXPLOIT PREVALENCE Top 5 Prevalent Malware – Global
10.
10 0 5,000 10,000
15,000 20,000 25,000 30,000 35,000 40,000 GH0ST.RAT PUSHDO ANDROMEDA SALITY ZEROACCESS PREVALENCE Top 5 Prevalent Botnets – Global
11.
11 Top 5 Prevalent
Attacks – Mongolia 0 5 10 15 20 25 30 GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT BACKDOOR.DOUBLEPULSAR PHP.CGI.ARGUMENT.INJECTION MS.SMB.SERVER.TRANS.PEEKING.DATA.INFORMATION.DISCLOSURE ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION PREVALENCE
12.
12 Top 5 Prevalent
Malware – Mongolia 0 2 4 6 8 10 12 14 RISKWARE/DRIVERPACK ANDROID/HIDDAD.HY!TR ADWARE/AIRPUSH!ANDROID RISKWARE/COINHIVE W32/KRYPTIK.GGXM!TR PREVALENCE
13.
13 Top 5 Prevalent
Botnets – Mongolia 0 2 4 6 8 10 12 14 16 18 GH0ST.RAT SALITY ANDROMEDA H-WORM GOZI PREVALENCE
14.
© Copyright Fortinet
Inc. All rights reserved. Quarterly Threat Landscape Report Q2 2018
15.
15
16.
CVE-2017-5638 – Apache
Struts 2 RCE
17.
17
18.
18
19.
19
20.
20 INTERNET Public Cloud Web Honeypot VM Drupal CMS Drupal
CMS deployed on a Linux Instance FortiGate NGFW in Monitoring Mode FortiGate NGFW FortiAnalyzer FortiAnalyzer for Centralized Reporting
21.
21 CVE-2018-7600 - Drupal
RCE
22.
22 Server Side Cryptojacking
23.
23 Client Side Browser
Based Cryptojacking
24.
24 FortiGuard Labs @
fortiguard.com
25.
25 NSS Labs 3rd-Party
Testing 9 Recommendations out of 9! Independent Testing WAFBDS NGIPS BPS DCSGDCIPS AEP NGFW SD-WAN
26.
© Copyright Fortinet
Inc. All rights reserved. баярлалаа