Blog

Blog

BEC Global Insights Report: December 2025

This report from Fortra Intelligence & Research Experts (FIRE) outlines key BEC trends for December 2025 based on active defense engagements. Findings include a 1% increase in overall attack volume compared to November, with gift cards as the leading cash-out method (52.8%) and Apple Store cards being most requested (50%).
Blog

WEF: AI Overtakes Ransomware as Fastest-Growing Cyber Risk

We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today.That's not just my opinion, that's also the message that comes loud and clear from the World Economic Forum's newly-published "Global Cybersecurity Outlook 2026." As the report bluntly...
Blog

6 Areas Turning Cyber Compliance from Checkboxes to Proof

A new year often brings a wave of updated cybersecurity compliance requirements. In 2026, regulators are raising the bar. “Check-the-box” compliance that may once have been sufficient to pass audits is no longer enough. Today’s mandates increasingly demand evidence: proof that controls are operating as designed, faster incident reporting, and broader disclosure obligations across vendors, systems,...
Blog

January 2026 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s January 2026 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2026-20805A vulnerability in the Desktop Windows Manager could lead to the disclosure of user-mode memory. Microsoft has...
Blog

Human Error Meets Data Exposure: The Breach Vector No One Talks About

Human error now plays a role in 95 percent of data breaches, making it more critical than ever for security teams to treat it as the substantial threat it is. In some cases, employees intentionally expose sensitive data for personal gain. But the most pervasive insider threats aren’t malicious — they’re accidental. This challenges the notion that an organization can become invulnerable if only it...
Blog

The Autonomy Paradox: Why Smarter AI Agents Are Harder to Secure

Agentic AI systems are designed for autonomy, but autonomy changes everything. These aren’t traditional vulnerabilities or software bugs; they’re design-level weaknesses where decision logic, data context, and control boundaries collide. And after a year of watching real agents drift, loop, and improvise in production, one thing’s clear: intelligence without constraint isn’t progress, it’s risk...
Blog

The Real Cost of Data Sprawl: Why Discovery Isn’t Enough

Data sprawl, the uncontrolled proliferation of data across cloud platforms, collaboration tools, and devices, is creating unprecedented challenges for organizations. As organizations generate and store ever-increasing volumes of unstructured data, every new file, workspace, or database adds complexity, multiplies exposure points, and increases the likelihood of sensitive information slipping...
Blog

Getting to know Errol Weiss: CSO at Health-ISAC

We recently sat down with Errol Weiss, Chief Security Officer (CSO) at Health-ISAC to better understand the challenges, excitements, and concerns facing executive-level security leaders: in healthcare and across the board. We discussed subjects including prescriptively preventing burnout, the largely untapped value in sharing threat intelligence, and closing the security loop so CISOs can sleep at...
Blog

Fortra’s Top 10 Standout Moments of 2025

This year, Fortra has been pushing the security envelope on a number of different fronts, and we’re excited to stay on the forefront of cyber change.On that note, here are Fortra’s top ten highlights of 2025. Running these down at year’s end keeps us honest. It shows both our customers and us how far we’ve come, and the exciting places we’re heading toward.1. Acquiring Lookout Cloud SecurityFortra...
Blog

CMMC Compliance: What You Need to Know Heading Into 2026

Now that CMMC 2.0 enforcement is finally underway, the whole topic of the U.S.’s Cybersecurity Maturity Model Certification needs to be revisited. Version 2.0 was simplified and finalized in 2024; however, its official start date was November 10, 2025. Consequently, defense contractors and hopefuls will have to officially clear this latest set of hoops to earn government contracts with the U.S....
Blog

The Supply Chain Vulnerability

Learn how Python pickle serialization exposes AI/ML pipelines to supply chain attacks. Discover exploitation methods and actionable steps to secure your models.
Blog

Staying Compliant While Using AI: What CISOs Need to Know

AI adoption is broad but maturity and security controls are lagging. This means that many organizations are using AI without having established governance boundaries or hardened production-scale controls. Treat AI systems as first-class assets in the risk register; apply the same governance, access controls, monitoring, auditability, and incident readiness as other critical systems. Here's how.
Blog

Velociraptor DFIR Tool Abused in WSUS RCE CVE-2025-59287

Below we describe post compromise activity taken by a threat actor following exploitation of the Windows Server Update Service (WSUS) remote code execution vulnerability CVE-2025-59287. In this breach, we have observed the threat actor using several common, typically benign tools to achieve their goals and attempt to mask their actions.The threat actor downloaded Velociraptor, a digital forensics...
Blog

Mind the Gaps: Incremental Steps Toward Real Security

Lynn Penick explores how small, disciplined steps can significantly improve cybersecurity maturity and prevent catastrophic breaches. Using the Louvre Museum heist as an example, it emphasizes that security failures often stem from simple oversights — like weak passwords — rather than sophisticated attacks.
Blog

Cybersecurity Risks During a Government Shutdown

The blog highlights the severe challenges facing U.S. cybersecurity due to a government shutdown and the expiration of the Cybersecurity Information Sharing Act of 2015. With CISA operating at only 35% capacity, federal support for CISOs is minimal, leaving organizations vulnerable to escalating nation-state cyberattacks. The lapse of liability protections discourages companies from sharing threat data, weakening collective defense efforts.
Blog

Agentic AI: Where Do We Go from Here?

A recent IEEE global study revealed that 96% believe that the innovation, exploration and adoption of AI - specifically agentic AI - will continue at “lightning speed” in 2026. What does that mean? It means that with the cement still hardening on AI regulatory compliance and the necessary data center infrastructure to support it still five years out, we’d better learn to secure it, and fast. AI...
Blog

Gartner Tells Businesses to Block AI Browsers Now

Analyst firm Gartner has issued a blunt warning to organizations: Agentic AI browsers introduce serious new security risks and should be blocked "for the foreseeable future."The firm's advisory, entitled "Cybersecurity Must Block AI Browsers for Now", argues that AI browsers are currently favoring convenience over security and that organizations are not ready for the risks that they pose."Gartner...
Blog

Fortra Patch Priority Index for November 2025

Fortra's November 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Chromium and Microsoft Edge (Chromium-based) that resolve five issues, including inappropriate implementation and out-of-bounds write vulnerabilities.Next on the list are patches for Microsoft Office, Word, and Excel. These patches resolve 11...