Blog

Blog

Your Taxes Are Done but the Scammers Aren’t

This blog conducts a deep dive into a recent and widespread tax scam identified through Fortra’s threat research. It offers the reader a detailed analysis into the email lure and provides insights with predictions into how these scammers can continue targeting victims even after the tax deadline has passed.
Blog

RansomHouse Ransomware: What You Need To Know

What is RansomHouse?RansomHouse is a cybercrime operation that follows a Ransomware-as-a-Service (RaaS) business model, where affiliates (who do not require technical skills of their own) use the ransomware operator's infrastructure to extort money from victims. So they are a bog-standard ransomware gang?Not quite. Many ransomware operations encrypt and steal your data, demanding a ransom for a...
Blog

What Are the Cyber Kill Chain Stages? Stage Four: Exploitation

The exploitation phase of the cyber kill chain is when attackers leverage vulnerabilities to execute malicious code and gain unauthorized access. This blog explores common exploitation techniques, real-world examples, and practical mitigation strategies to protect your organization.
Blog

What Are the Cyber Kill Chain Stages? Stage Three: Delivery

This blog delves into the delivery stage of the cyber kill chain, where attackers transition from preparation to launching their payloads. It highlights common attack methods, proactive security measures, and how Fortra helps mitigate these cyber threats.
Vulnerability Research

Patch Tuesday Update - December 2024

Fortra Vulnerability Management will include the Microsoft Patch Tuesday checks in the NIRV 4.56.0 and FVM Agent 2.17.Microsoft addressed 70 vulnerabilities this release, including 16 rated as Critical.CVE-2024-49138 - Microsoft has disclosed an actively exploited vulnerability that allows attackers to gain SYSTEM privileges on Windows devices. No further information is provided from Microsoft on...
Blog

Automation Solutions: Advice from Real Users

Real users with real opinions offer valuable insight. When evaluating software solutions essential to your organization, the experiences of your peers should weigh heavily. PeerSpot, an enterprise-buying intelligence platform, has assembled a Peer Report to help navigate the advantages of using multiple automation solutions to enhance operational security and efficiency. You can download the...