Blog

Blog

Defending the Digital Brand: Why CISOs Must Lead the Charge

Once considered merely a marketing issue, brand protection has transformed into a strategic imperative. In today’s global digital arena, brand protection must contend with a surge of adversarial methods, including AI-driven impersonation, social phishing, and counterfeit marketplaces.The consequences of neglecting brand protection are significant: Businesses risk direct financial losses,...
Blog

Imitation May Be the Highest Form of Flattery, But Brand Impersonation Is Not

Imitation is often the clearest sign your brand is making an impact. Whether through a viral moment or a market-defining launch, your success doesn’t just capture attention. It sets the pace, inspiring both competitors and collaborators to follow your lead.But when imitation crosses the line into online brand impersonation, the effects shift from flattering to potentially disastrous. Deceptive...
Blog

Drowning in Cyber Threat Intelligence Data?

For many organizations, the issue isn’t a lack of cyber threat intelligence. Instead, internal security teams grapple with an excess of threat intelligence data, including alerts, indicators, and dashboards, yet their brand protection still falls short.Why is that? Because merely having threat intelligence data doesn’t automatically enhance your security posture. Without the proper context,...
Blog

When Digital and Physical Threats Intertwined: The Need for Executive Protection

Executives face growing risks from both digital and physical threats, with online exposure often leading to real-world dangers like harassment or security breaches. Traditional physical security alone is no longer sufficient — organizations must integrate digital executive protection, including threat monitoring, data exposure mitigation, and coordinated response across teams.
Blog

UDRP Domain Takeover vs. Domain Takedown

In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Phishing-as-a-Service Profile: LabHost Threat Actor Group

Fortra continues to monitor malicious activity targeting Canadian banks by the Phishing-as-a-Service (PhaaS) group known as LabHost. Throughout 2022 and 2023, phishing campaigns linked to PhaaS platforms have surged, as threat actors increasingly rely on subscription-based services to execute attacks. These platforms offer a range of features, including stolen industry branding, real-time...
Blog

How to Combat Executive Impersonation on Social Media

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Threat Actor Profile: Strox Phishing-as-a-Service

Since early 2022, Fortra has been monitoring a significant ongoing upward trend in fraud activity originating from various Phishing-as-a-Service (PhaaS) operations. Some of these services have thrived, while the popularity of others has diminished. One PhaaS operation that has notably been present throughout is Strox (aka Strox.su or Strox Pages). Strox is one of the most complete phishing...
Blog

Top Fraudulent Activity Targeting Retail on the Dark Web

Threat actors exploit the dark web to trade stolen data and illicit goods anonymously, often without the victim organization’s awareness. Malicious activity takes many forms across underground channels, but the technical barriers to accessing the dark web limit visibility — making it challenging to identify which assets may be exposed.If sensitive information is undetected on the dark web,...
Blog

Fake Mobile Apps Leave Users Vulnerable, Damage Brands

Fake mobile apps are more sophisticated and more dangerous than ever. Cloned and spoofed mobile applications flood both official and third-party app stores, exploiting brand trust to trick users into downloading malware. These imposters don’t just erode brand equity; they expose users to serious data breaches. And with mobile users often skipping basic security precautions, the risk of compromise...
Blog

Top 10 TLDs Abused

Domains remain one of the most exploited tools in the hands of threat actors, fueling phishing schemes and victim manipulation. In our latest Quarterly Threat Trends & Intelligence Report, we uncover how attackers are weaponizing Legacy Generic (gTLD) and Country Code (ccTLD) top-level domains — along with HTTPS and free security certificates — to infiltrate and target enterprises. Top-level...
Blog

Social Media Attacks Increase 47%

Social media threats targeting enterprises have increased 47% since January 2021, according to our Quarterly Threat Trends & Intelligence Report. While the attack volume varies by industry, today the average organization is being targeted on social media with increasing frequency.Every quarter, we analyze and mitigates hundreds of thousands of phishing and social media attacks targeting...
Blog

Look-alike Domain Mitigation: Breaking Down the Steps

Look-alike domains remain some of the most consistent elements of cyber-attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: Remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its...
Blog

The Threat of Look-alike Domains Explained

Every year, cybercriminals spin up hundreds of thousands of look-alike domains — tiny, deceptive variations of real web addresses that exist purely to trick people and steal money. A look-alike domain is a nearly identical domain name, registered with intent to impersonate a legitimate brand. In this post we’ll show how domain names power online communication, break down the anatomy of these...
Blog

How to Detect Look-alike Domain Registrations

Malicious domains play a central role in a wide range of cyberattacks that can severely damage a brand’s reputation. Spoofed domains are often quick and inexpensive to create, making them effective tools for launching phishing campaigns and distributing malicious emails. To identify and respond to domain-based threats targeting your organization, security teams must adopt advanced, well-defined...
Blog

Digital Risk Protection vs. Digital Threat Intelligence

Digital Risk Protection (DRP) is rapidly gaining attention among CISOs and security professionals. Once seen as a subset of Digital Threat Intelligence (DTI), DRP has evolved into a distinct security discipline, recognized by analyst research, including the Gartner Hype Cycle, for its ability to address a wide range of external cyber threats. Many organizations now rely on DRP daily to protect...