Blog

Blog

Defenders Fall Behind, as AI Rewrites the Rules of a Data Breach

For almost 20 years, stolen credentials have been the most common route for attackers into organizations, according to the Verizon Data Breach Investigations Report (DBIR). But that's no longer the case.According to the newly published 2026 report, exploitation of vulnerabilities has overtaken credential theft as the leading vector for hackers to gain their initial access — accounting for 31% of...
Blog

Agentic AI's Affordability Gap Is a Security Problem

The first agentic SOC products entering trial or are in early access phases are already metering investigations by token consumption and rate-limiting how many an organization can run per hour. Enterprise buyers can absorb this. Mid-market companies, public sector agencies, and critical infrastructure operators running lean security programs cannot, and they face the same threat landscape.
Blog

Getting to Know Goher Mohammad, CISO at L&Q

Goher Mohammad’s path into cybersecurity may feel familiar, and for good reason. Starting in IT, then moving into risk and compliance before stepping into security leadership, his journey followed the same path that played out in the industry. We recently spoke with Goher about how the CISO role is evolving, what it takes to lead through an incident, and the challenges of securing organizations...
Blog

May 2026 Patch Tuesday Analysis

This Patch Tuesday Analysis addresses Microsoft’s April 2026 Security Updates. Fortra Intelligence and Research Experts are actively working on coverage for these vulnerabilities.
Blog

BEC Global Insights Report: April 2026

Discover key April 2026 BEC threat insights from Fortra Intelligence & Research Experts (FIRE), including a 151% surge in attack volume, increased cryptocurrency scams, advanced fee fraud trends, rising wire transfer requests, and evolving email tactics used by cybercriminals.
Blog

One in Eight UK Workers Has Sold Their Company Passwords, and Bosses Think it's Fine

It's all very well defending your organization from external hackers and malware attacks, but your systems are only as strong as the people to whom you have handed the keys.According to new research, an uncomfortable number of people appear willing to sell critical credentials and passwords to the highest bidder.The Workplace Fraud Trends report, published by Cifas, claims that an eyebrow-raising...
Blog

Interview with Troy Hunt: Getting Excited About AI for All the Right Reasons. And Knowing Where to Draw the Line.

Coming from a security lens, skepticism about AI is the default. With last week’s Mythos debacle hardly in the rearview, the attitude is only reinforced. I recently had the chance to sit down with Troy Hunt and pick his brain on the subject. What he had to offer was surprising, and (dare I say) refreshing. While we can never stop asking “how is this going to hurt us,” a myopic view of the...
Blog

Sometimes Changing the Password on Your Email Mailbox Isn't Enough

Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it.A new report from researchers at Proofpoint reveals that approximately one in 10 Microsoft 365 accounts compromised in Q4 2025 had malicious mailbox rules created shortly after the attacker...
Blog

April 2026 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s April 2026 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.
Blog

AI and Cryptocurrency Scams are Costing Americans Billions, FBI Reports

The FBI's Internet Crime Complaint Center (IC3) has released its 2025 Annual Report, and two threats dominate the headlines: artificial intelligence and cryptocurrency. Together, crypto and AI is reshaping the fraud landscape in ways that should concern organizations and individuals alike.According to its report, for the first time in the IC3's 25-year history, complaints of cybercrime crossed the...
Blog

Fortra Discovers Datto Living Off the Land Binary

Fortra researchers identified an active phishing campaign that delivers a Remote Access Trojan by abusing Datto’s legitimate RMM platform as its command-and-control channel, giving attackers persistent, full remote access while blending into normal enterprise traffic. The campaign relies on social engineering rather than exploits and is difficult to detect because malicious activity is tunneled through trusted Datto RMM infrastructure over HTTPS.