Blog

Blog

Defending the Digital Brand: Why CISOs Must Lead the Charge

Once considered merely a marketing issue, brand protection has transformed into a strategic imperative. In today’s global digital arena, brand protection must contend with a surge of adversarial methods, including AI-driven impersonation, social phishing, and counterfeit marketplaces.The consequences of neglecting brand protection are significant: Businesses risk direct financial losses,...
Blog

Imitation May Be the Highest Form of Flattery, But Brand Impersonation Is Not

Imitation is often the clearest sign your brand is making an impact. Whether through a viral moment or a market-defining launch, your success doesn’t just capture attention. It sets the pace, inspiring both competitors and collaborators to follow your lead.But when imitation crosses the line into online brand impersonation, the effects shift from flattering to potentially disastrous. Deceptive...
Blog

Drowning in Cyber Threat Intelligence Data?

For many organizations, the issue isn’t a lack of cyber threat intelligence. Instead, internal security teams grapple with an excess of threat intelligence data, including alerts, indicators, and dashboards, yet their brand protection still falls short.Why is that? Because merely having threat intelligence data doesn’t automatically enhance your security posture. Without the proper context,...
Blog

When Digital and Physical Threats Intertwined: The Need for Executive Protection

Executives face growing risks from both digital and physical threats, with online exposure often leading to real-world dangers like harassment or security breaches. Traditional physical security alone is no longer sufficient — organizations must integrate digital executive protection, including threat monitoring, data exposure mitigation, and coordinated response across teams.
Blog

Optimize Your PCI DSS 4.0 Compliance with Fortra Managed WAF

If your organization accepts credit cards online, you likely know about PCI compliance. You also may be aware of PCI DSS 4.0, which introduces new requirements that must be met by March 31, 2025. A web application firewall (WAF) with client-side protection is an excellent solution for meeting the web application requirements, particularly PCI DSS 4.0 Requirements 6.4.2, 6.4.3, and 11.6.1.Why is...
Blog

Achieving XDR Outcomes with a Managed Approach

There are two trends in security today that seem to be at odds. One: Cybersecurity efforts, awareness, and technologies are improving constantly. And two: Threats, breaches, and security incidents continue to rise. Despite growing attention to the expanding attack surface and increasing attempts to implement solutions, the industry has yet to crack the combination en masse as attackers continue to...
Blog

Where’s the Tipping Point? 6 Signs It’s Time for an MSSP

Explore six signs it’s time for your business to partner with a Managed Security Service Provider (MSSP). From rising security incidents to compliance demands and cost savings, learn how Fortra’s Alert Logic can strengthen your defenses with expert threat intelligence and 24/7 protection.
Blog

UDRP Domain Takeover vs. Domain Takedown

In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Blog

Phishing-as-a-Service Profile: LabHost Threat Actor Group

Fortra continues to monitor malicious activity targeting Canadian banks by the Phishing-as-a-Service (PhaaS) group known as LabHost. Throughout 2022 and 2023, phishing campaigns linked to PhaaS platforms have surged, as threat actors increasingly rely on subscription-based services to execute attacks. These platforms offer a range of features, including stolen industry branding, real-time...
Blog

How to Combat Executive Impersonation on Social Media

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Threat Actor Profile: Strox Phishing-as-a-Service

Since early 2022, Fortra has been monitoring a significant ongoing upward trend in fraud activity originating from various Phishing-as-a-Service (PhaaS) operations. Some of these services have thrived, while the popularity of others has diminished. One PhaaS operation that has notably been present throughout is Strox (aka Strox.su or Strox Pages). Strox is one of the most complete phishing...
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your expectations and fortify your environment like never before with Fortra.
Blog

Top Fraudulent Activity Targeting Retail on the Dark Web

Threat actors exploit the dark web to trade stolen data and illicit goods anonymously, often without the victim organization’s awareness. Malicious activity takes many forms across underground channels, but the technical barriers to accessing the dark web limit visibility — making it challenging to identify which assets may be exposed.If sensitive information is undetected on the dark web,...