Newsroom

News Article

Manufacturing.net: How You Should Approach a Ransomware Attack

Chris Reffkin, Chief Security & Risk Officer at Fortra, authored an article for Manufacturing.net that outlines how technology and security leaders should react in the critical early moments of a ransomware attack. He explains why containment must remain the top priority, how leaders should communicate clearly and quickly with executives, and how to assess the impact with support from legal and incident response teams.
News Article

Cyber Security News: PoC Released for Windows Vulnerability That Allows Attackers to Cause Unrecoverable BSOD Crashes

Ricardo Narvaja’s vulnerability research is featured in Cyber Security News, examining CVE-2026-2636, a denial-of-service flaw in Windows’ Common Log File System driver. The vulnerability allows a low-privileged user to trigger an unrecoverable Blue Screen of Death through a simple proof of concept requiring only two API calls. 
News Article

Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q4 2025

Fortra is featured in the Q4 2025 APWG Phishing Activity Trends Report for its analysis of Business Email Compromise activity and attacker behavior. Fortra examined thousands of BEC attacks during the quarter and identified a 136 percent increase in wire transfer attempts. The average request amount rose to 50,297 dollars. The report also highlights Scripted Sparrow, a threat group that has become...
News Article

The Epoch Times: Why Your Personal Data Are Floating Around on the Darknet, Which Just Keeps Growing

Bob Erdman, Associate VP of R&D at Fortra, is quoted in a recent The Epoch Times feature exploring how personal data accumulates on the darknet, how criminals monetize breach information, and why these underground markets continue to grow despite law enforcement action. Erdman highlights how repeated breach exposures allow attackers to build and trade increasingly complete identity profiles,...
News Article

The AI Journal: Sora 2: Deepfakes Waiting to Happen

John Wilson, Senior Fellow, Threat Research at Fortra, authored an article for The AI Journal examining the security implications of OpenAI’s Sora 2. The piece looks at how increasingly realistic AI-generated video changes the threat landscape, particularly around deepfakes, social engineering, and the misuse of personal likenesses. 
News Article

​​Security Boulevard: Why We’ll Never Patch Everything, and That’s Okay​

In Security Boulevard, Tyler Reguly explains why the goal of patching every vulnerability is not just unrealistic but counterproductive. Drawing on more than two decades in vulnerability management, he argues that security teams need to stop chasing raw CVE counts and instead focus on risk, context, and asset intelligence to decide what truly matters.Originally published in ​Security Boulevard....
News Article

​​Manufacturing.net: Examining the Wins and Challenges of National Cybersecurity Policies​

National cybersecurity policies are essential but difficult to implement at the pace modern threats demand. In Manufacturing.net, John Grancarich examines how government frameworks have improved security posture, where they struggle in real-world application, and why private sector vendors play a critical role in closing the gap between policy and practice.Originally published in ​Manufacturing...