Blog

Blog

Gartner Tells Businesses to Block AI Browsers Now

Analyst firm Gartner has issued a blunt warning to organizations: Agentic AI browsers introduce serious new security risks and should be blocked "for the foreseeable future."The firm's advisory, entitled "Cybersecurity Must Block AI Browsers for Now", argues that AI browsers are currently favoring convenience over security and that organizations are not ready for the risks that they pose."Gartner...
Blog

Fortra Patch Priority Index for November 2025

Fortra's November 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Chromium and Microsoft Edge (Chromium-based) that resolve five issues, including inappropriate implementation and out-of-bounds write vulnerabilities.Next on the list are patches for Microsoft Office, Word, and Excel. These patches resolve 11...
Blog

Ransomware May Have Extorted Over $2.1 Billion Between 2022-2024, but it's not all Bad News, Claims FinCEN Report

A new report from the United States's Financial Crimes Enforcement Network (FinCEN) has shone a revealing light on the state of the criminal industry of ransomware.The report, which examines ransomware incidents from 2022 to 2024, reveals that attackers extorted more than $2.1 billion over the three-year period.Yes, that number is enormous - but it hides a more interesting story beneath it: that...
Vulnerability Research

December 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s December 2025 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-62221A use after free vulnerability in the Windows Cloud Files Mini Filter could allow an authenticated user to...
Blog

AI Espionage Is Here: Why Data Security Must Be Your First Priority

Anthropic’s recent report on the first AI-orchestrated cyber espionage campaign isn’t just another headline, it’s a turning point. Attackers leveraged AI to automate nearly every stage of the intrusion lifecycle: reconnaissance, vulnerability scanning, exploitation, credential harvesting, and exfiltration. What’s striking is the speed and sophistication: tasks that once required weeks of human...
Blog

Using AI to Turn CVSS Scoring into Patch Prioritization

The age of AI is no time to be getting behind on alerts. But the old system of prioritizing patches based on CVSS scores alone is outmoded and ineffective.Fortra brings AI into the patch prioritization arena, enhancing traditional CVSS scoring with ML models that determine how likely that a vulnerability is to get exploited in a real-world scenario. Then, reconfiguring priorities from there. This...
Blog

Why the Record-Breaking 30 Tbps DDoS Attack Should Concern Every Business

If you're reading this article, I can be pretty sure your organization relies on the internet. It may be for serving customers, delivering apps, running cloud services, or simply maintaining your day-to-day operations.The fact is if your connection to the internet is disrupted, it is likely that there will be an impact on your business to a lesser or greater extent.And that's why a new warning...
Blog

FBI Warns of Surge in Account Takeover (ATO) Fraud Schemes - What You Need To Know

What is account takeover fraud?Account takeover fraud (also known as ATO fraud) occurs when a malicious hacker or fraudster compromises and gains control of an account without legitimate authorisation.Typically the online account might be a bank account, email account, or social media profile that has been accessed after stealing login credentials through phishing, malware, a data breach, or...
Blog

Defending the Identity Layer in the Age of AI

Attackers increasingly target the identity layer, “abusing overprivileged accounts, misconfigured roles, or insecure tokens to gain lateral access,” as noted in the Fortra FIRE team’s recent Secure AI Innovation guide. Forbes reports that 75% of attacks now utilize identity-based threats, and recent research reveals that 90% of organizations have experienced an identity-related security incident...
Blog

Threat Hunting Across Industry Sectors: Threats and Strategic Defences August 2025

IntroductionIn an increasingly digitized world, the battle between organizations and cyber adversaries has never been more dynamic, or more consequential. Every industry, from financial services to healthcare, education, and beyond, faces attackers who are constantly evolving, armed with automation, AI-driven tactics, and global criminal networks. The question is no longer if adversaries will...
Blog

Shadow AI Security Breaches will hit 40% of all Companies by 2030, Warns Gartner

40% of global organisations could be hit by security breaches due to "shadow AI" by 2030, according to analyst firm Gartner.Shadow AI - the use of artificial intelligence tools by employees without a company's approval and oversight - is becoming a significant cybersecurity risk.Unlike traditional "shadow IT," which involves workers installing unauthorised software or plugging in unapproved...
Blog

Why AI Security Means API Security

APIs can no longer be relegated to the back burner of security. As one of the primary ways in which GenAI models function, API security is closely linked – if not synonymous with – AI security. The issue is changing the mindset. Before the AI wave, APIs were the primary tool of developers to connect applications on the backend. They still are. However, placing them squarely in the dev circle for...
Blog

Beyond Compliance: Turning Data Protection into a Competitive Advantage

Today’s clients and consumers aren’t satisfied with bare-minimum compliance checkboxes anymore - if ever they were. As the stakes rise on organizational data value, so does attention to its security. That’s why data security is now not only table stakes, but a key differentiator when choosing where to invest. Organizations that want to stay ahead of competitors have a unique opportunity; as data...
Blog

UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers

After years of delays, the UK government has finally introduced landmark cybersecurity legislation that could reshape how British organisations defend against digital attacks.The Cyber Security and Resilience Bill arrives as cyber-attacks cost the British economy an estimated £14.7 billion annually - approximately 0.5% of GDP.The bill significantly expands the types of organisation required to...
Blog

AI: Lacking Guardrails, Talent, and Resources?

Artificial intelligence is already present in our workflows, communication tools, customer systems, and even decision-making processes. Yet, most organizations are still catching up to what this means for risk and responsibility.AI’s rapid advancement echoes previous technology shifts - like Cloud Migration and Automation and SaaS adoption - where governance lagged behind innovation.But AI isn’t...
Blog

The Data Confidence Gap: Why Organizations Still Can’t Trust Their Data

In the era of big data, the ultimate irony is that many companies are too afraid to use their own.The data confidence gap has become a significant aspect of security discussions today, as different departments approach the table with varying metrics, and none of them align. For a company to use its information in a way that genuinely moves the business forward, every party that leverages that data...
Blog

What Does it Take to Deploy AI Successfully?

AI use is growing rapidly. Research from Stanford University found that 78% of organizations reported using the technology in 2024, up from 55% the previous year.Unfortunately, however, that speed of implementation often comes at the cost of security and the problem is that, in a mad dash to adopt AI and remain competitive, organizations are chasing innovation faster than they can secure and...