Blog

Blog

Compliance Breakdowns: Making Sure They Only Happen Once

Cross-functional alignment is one of the most effective tools a CIO has for maintaining compliance in a fragmented regulatory environment. However, while many understand that disparate teams working together is “what it’s all about,” many CIOs may not yet realize that it’s their responsibility to take point for the process.Or, that a successful compliance outlook doesn’t mean perfection – it means...
Blog

SafePay Ransomware: What You Need To Know

What is the SafePay ransomware?SafePay is a relatively new ransomware threat that was first observed around September 2024. Like other ransomware, SafePay encrypts victims' files so they cannot be accessed, and then demands the payment of a cryptocurrency ransom for their recovery. As part of a "double extortion" tactic, the hackers behind SafePay also steal data from affected organisations and...
Blog

Cyberattacks Surge 650%: Insights from the IRIS Report

The latest Information Risk Insight Study (IRIS) highlights a 650% rise in significant cyber incidents over 15 years, with ransomware and infrastructure attacks on the rise. This blog explores key findings and shows how Fortra helps organizations respond to today’s evolving risks.
Blog

What Can You Monitor on Your Campus Network?

The better question is, what can't you monitor on campus? Intermapper provides education network monitoring for anything on your campus with an IP address. Check out the infographic to see examples of the possibilities. ...
Blog

Bert Ransomware: What You Need To Know

What is the Bert ransomware?Bert is a recently-discovered strain of ransomware that encrypts victims' files and demands a payment for the decryption key.Why is it called Bert?I truly have no idea. Maybe whoever created Bert put all of their efforts into the coding of their ransomware, rather than thinking of its marketing. Or maybe they just really like the name "Bert."Or maybe the hacker who...
Blog

BEC Global Insights Report: May 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

June 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s June 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1160 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2025-33053A WebDAV code execution vulnerability, CVE-2025-33053 requires that a user open a malicious .URL file for compromise to...
Blog

CMMC Compliance Checklist: Steps to Achieve Certification

CMMC is a cybersecurity standard implemented by the US Department of Defense to protect sensitive data within its supply chain. Use this checklist to help achieve certification.
Blog

Fortra Patch Priority Index for May 2025

Fortra's May 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chromium that resolve 6 issues including spoofing, out of bounds memory access, insufficient data validation, inappropriate implementation, use after free, and heap buffer overflow vulnerabilities.Next on the...