Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates that a system might be infected by KeyBase Botnet.KeyBase is a keylogger malware that infects Windows machines....

Aug 31, 2018
This indicates an attack attempt to exploit a Cross-Site Scripting vulnerability in Open-AudIT Community.The vulnerability is...

Aug 31, 2018
This indicates an attack attempt to exploit an Use After Free Vulnerability in Foxit Software PhantomPDF.The vulnerability is...

Aug 30, 2018
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in Microsoft Windows Task Scheduler.This vulnerability...

Aug 30, 2018
This indicates an attack attempt against a Arbitrary File Read vulnerability in MikroTik RouterOS.The vulnerability is due to...

Aug 30, 2018
This indicates an attack attempt to exploit a Use After Free Vulnerability in VCFTools.The vulnerability is due to an error in...

Aug 30, 2018
This indicates an attack attempt to exploit a Heap Buffer Overflow Vulnerability in H2O Web Server.The vulnerability is due to...

Aug 29, 2018
This indicates that a system might be infected by InivisiMole Botnet.InvisiMole is a malware that has the capability to turn a...

Aug 29, 2018
This indicates an attack attempt against a Memory Corruption vulnerability in Photoshop CC.The vulnerability is due to an error...

Aug 28, 2018
This indicates an attack attempt against a Memory Corruption vulnerability in Photoshop CC.The vulnerability is due to an error...

Aug 28, 2018
This indicates the detection of a Zero-Day threat discovered by Fortinet's FortiGuard Labs. This signature should help mitigate...

Aug 28, 2018
This indicates an attack attempt to exploit a Use After Free Vulnerability in Foxit Software PhantomPDF.The vulnerability is due...

Aug 28, 2018
This indicates an attack attempt to exploit a Type Confusion vulnerability in Google Chrome V8 Javascript Engine.The vulnerability...

Aug 28, 2018
This indicates that a system on your network is infected by Trojan Keymarble .Keymarble is a backdoor that provides access to...

Aug 28, 2018
This indicates an attempt to connect to a malware sinkhole server.Government agencies and researchers sometimes sinkhole malware...

Aug 28, 2018
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Samba libsmbclient library.The vulnerability...

Aug 28, 2018
This indicates that a system might be infected by Strictor Botnet.Strictor is a Trojan that infects Windows machines. It sends...

Aug 28, 2018
This indicates an attack attempt to exploit an Authentication Bypass vulnerability in Datalust Seq.The vulnerability is due to...

Aug 24, 2018
This indicates an attack attempt to exploit an OS Command Injection vulnerability in Horde Project Groupware Webmail.The vulnerability...

Aug 24, 2018
This indicates an attack attempt to exploit a Use After Free Vulnerability in Microsoft Internet Explorer.The vulnerability is...

Aug 24, 2018