Blog

Blog

Drowning in Cyber Threat Intelligence Data?

For many organizations, the issue isn’t a lack of cyber threat intelligence. Instead, internal security teams grapple with an excess of threat intelligence data, including alerts, indicators, and dashboards, yet their brand protection still falls short.Why is that? Because merely having threat intelligence data doesn’t automatically enhance your security posture. Without the proper context,...
Blog

When Digital and Physical Threats Intertwined: The Need for Executive Protection

Executives face growing risks from both digital and physical threats, with online exposure often leading to real-world dangers like harassment or security breaches. Traditional physical security alone is no longer sufficient — organizations must integrate digital executive protection, including threat monitoring, data exposure mitigation, and coordinated response across teams.
Blog

Highlights from Release Day 2025.1

Fortra’s 2025.1 Release Day includes improvements to email security, managed file transfer, data classification, security awareness training, and more.
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Top Fraudulent Activity Targeting Retail on the Dark Web

Threat actors exploit the dark web to trade stolen data and illicit goods anonymously, often without the victim organization’s awareness. Malicious activity takes many forms across underground channels, but the technical barriers to accessing the dark web limit visibility — making it challenging to identify which assets may be exposed.If sensitive information is undetected on the dark web,...
Blog

Digital Risk Protection vs. Digital Threat Intelligence

Digital Risk Protection (DRP) is rapidly gaining attention among CISOs and security professionals. Once seen as a subset of Digital Threat Intelligence (DTI), DRP has evolved into a distinct security discipline, recognized by analyst research, including the Gartner Hype Cycle, for its ability to address a wide range of external cyber threats. Many organizations now rely on DRP daily to protect...