Blog

Blog

What are Cloud Misconfigurations?

As we use more cloud applications, it’s become harder to maintain and control our multi-cloud environments. Because of this increasing complexity, configuration errors are becoming increasingly common; Gartner says that 99% of cloud security failures will be caused by misconfiguration. To prevent breaches caused by cloud misconfigurations, organizations rely on cloud data security solutions....
Blog

Defending the Digital Brand: Why CISOs Must Lead the Charge

Once considered merely a marketing issue, brand protection has transformed into a strategic imperative. In today’s global digital arena, brand protection must contend with a surge of adversarial methods, including AI-driven impersonation, social phishing, and counterfeit marketplaces.The consequences of neglecting brand protection are significant: Businesses risk direct financial losses,...
Blog

VPN Replacement: Why You Need It and How to Find the Right One

When the industry outgrew the perimeter, it also outgrew VPNs. Now, VPN replacements are in high demand as organizations look for scalable, lightweight ways to secure distributed data in a distributed workforce.Understanding VPN and Its LimitationsVPNs were built for a bygone era, but fail to secure remote work, private data, or private applications today.VPN Security ChallengesSecuring VPNs is a...
Blog

Imitation May Be the Highest Form of Flattery, But Brand Impersonation Is Not

Imitation is often the clearest sign your brand is making an impact. Whether through a viral moment or a market-defining launch, your success doesn’t just capture attention. It sets the pace, inspiring both competitors and collaborators to follow your lead.But when imitation crosses the line into online brand impersonation, the effects shift from flattering to potentially disastrous. Deceptive...
Blog

Drowning in Cyber Threat Intelligence Data?

For many organizations, the issue isn’t a lack of cyber threat intelligence. Instead, internal security teams grapple with an excess of threat intelligence data, including alerts, indicators, and dashboards, yet their brand protection still falls short.Why is that? Because merely having threat intelligence data doesn’t automatically enhance your security posture. Without the proper context,...
Blog

What is ZTNA?

Zero Trust NetworkingAs an increasing number of users access resources from anywhere, ZTNA solutions can help eliminate gaps in other secure remote access technologies and methods.Zero Trust Network Access (ZTNA) enforces granular, adaptive, and context-aware policies for providing secure and seamless Zero Trust access to private apps hosted across clouds and corporate data centers, from any...
Blog

SSE vs SASE: How Are They Related?

In order to take advantage of cloud-centric business models, many organizations are considering developing a Secure Access Service Edge (SASE) architecture. But how do you choose the right solution? There is no shortage of vendors selling tools to secure interactions between devices, applications, on-premises resources and infrastructure. As a result, it can be challenging to select the right mix...
Blog

What is Security Service Edge (SSE)?

Security Service Edge is the security stack of SASE (that also includes a networking stack including SD-WAN). A complete SSE stack of cloud security services allows organizations to protect their workforce from internet threats, provides secure and adaptive access to private corporate applications, and protects data across all their cloud platforms and applications.Security Service EdgeThere are 3...
Blog

When Digital and Physical Threats Intertwined: The Need for Executive Protection

Executives face growing risks from both digital and physical threats, with online exposure often leading to real-world dangers like harassment or security breaches. Traditional physical security alone is no longer sufficient — organizations must integrate digital executive protection, including threat monitoring, data exposure mitigation, and coordinated response across teams.
Blog

UDRP Domain Takeover vs. Domain Takedown

In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Phishing-as-a-Service Profile: LabHost Threat Actor Group

Fortra continues to monitor malicious activity targeting Canadian banks by the Phishing-as-a-Service (PhaaS) group known as LabHost. Throughout 2022 and 2023, phishing campaigns linked to PhaaS platforms have surged, as threat actors increasingly rely on subscription-based services to execute attacks. These platforms offer a range of features, including stolen industry branding, real-time...
Blog

How to Combat Executive Impersonation on Social Media

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Threat Actor Profile: Strox Phishing-as-a-Service

Since early 2022, Fortra has been monitoring a significant ongoing upward trend in fraud activity originating from various Phishing-as-a-Service (PhaaS) operations. Some of these services have thrived, while the popularity of others has diminished. One PhaaS operation that has notably been present throughout is Strox (aka Strox.su or Strox Pages). Strox is one of the most complete phishing...
Blog

Top Fraudulent Activity Targeting Retail on the Dark Web

Threat actors exploit the dark web to trade stolen data and illicit goods anonymously, often without the victim organization’s awareness. Malicious activity takes many forms across underground channels, but the technical barriers to accessing the dark web limit visibility — making it challenging to identify which assets may be exposed.If sensitive information is undetected on the dark web,...
Blog

Fake Mobile Apps Leave Users Vulnerable, Damage Brands

Fake mobile apps are more sophisticated and more dangerous than ever. Cloned and spoofed mobile applications flood both official and third-party app stores, exploiting brand trust to trick users into downloading malware. These imposters don’t just erode brand equity; they expose users to serious data breaches. And with mobile users often skipping basic security precautions, the risk of compromise...
Blog

Top 10 TLDs Abused

Domains remain one of the most exploited tools in the hands of threat actors, fueling phishing schemes and victim manipulation. In our latest Quarterly Threat Trends & Intelligence Report, we uncover how attackers are weaponizing Legacy Generic (gTLD) and Country Code (ccTLD) top-level domains — along with HTTPS and free security certificates — to infiltrate and target enterprises. Top-level...
Blog

Social Media Attacks Increase 47%

Social media threats targeting enterprises have increased 47% since January 2021, according to our Quarterly Threat Trends & Intelligence Report. While the attack volume varies by industry, today the average organization is being targeted on social media with increasing frequency.Every quarter, we analyze and mitigates hundreds of thousands of phishing and social media attacks targeting...