Blog

Blog

Threat Intelligence vs. Threat Data: What’s the Difference?

Organizations are still overwhelmed by what they’re told, and sold as, ‘Threat Intelligence.’ In reality it falls short, as its really just threat/IOC data.The term has been thrown around so often that its true meaning and value have been diluted. It’s time to set the record straight and restore the trust and respect that ‘Threat Intelligence’ deserves.Threat Data: What It Really IsThreat data is...
Blog

The Rising Tide of Cyber-Attacks Against the UK Water Sector

Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years.The disclosure that attackers are probing the systems relied on to manage the delivery of safe drinking water to millions of households comes in newly-released information from the Drinking Water Inspectorate (DWI), following a...
Blog

Fortra Patch Priority Index for October 2025

Fortra's October 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Chromium, Internet Explorer, and Microsoft Edge (Chromium-based) that resolve 15 issues, including use-after-free, heap buffer overflow, inappropriate implementation, and remote code execution vulnerabilities.Next on the list are patches for...
Blog

What 20 Years Has Taught Him About What Security Needs - And Where It’s Going

A good company is greater than the sum of its parts. But at Fortra, those parts are pretty good, too. Recently, we had a chance to sit down with Tyler Reguly, Associate Director, Security R&D at Fortra. A career cybersecurity veteran, Tyler graduated from Fanshawe College, where he developed and taught five courses on hacking and malware. He has contributed to various standards, including CVSSv3...
Blog

Your AI Model Might Not Be Worth Using - Without the Right Data Security in Place

In the age of AI, data security does more than protect your information. It can determine how your business is run. Now, more than ever, companies rely on their data to make choices about product placement, new markets, consumer trends, investments, and more. Nowhere does the adage “put good in, get good out” apply more. Yet we still see companies that undervalue data security as the fundamental...
Blog

Does Your Cybersecurity Framework Need Rebuilding?

Rebuilding a cybersecurity framework is remarkably similar to renovating a home. It’s time consuming, expensive, and, frankly, something that most people try to put off. However, just like a burst pipe or house fire would force you to renovate your home, there are certain indicators and situations that should prompt an immediate framework rebuild, regardless of budget constraints. This might...
Blog

Creating a Winning Alliance: Bridging Security and Compliance

Does there have to be tension between security and compliance? They’re certainly not the same, as I note in my previous blog, Security vs. Compliance: What’s the Difference? It’s never been fun to have to show your work, and nobody wants to be a nag, so how can the groups come together to create something stronger than the individual parts? Here are a few ways to create that winning alliance....
Blog

New Report: 33% of Breached Face Financial Trouble Due to Fines, Not Breach Itself

If the breach doesn’t get you, the fines will. According to the latest Cyber Readiness Report by SMB-focused insurer Hiscox, after being breached, one in three organizations were hit with fines large enough to impact their financial health.This could result from doing business in multiple markets - California, the EU, and Canada, for example - and accruing respective fines of thousands or even...
Blog

Cyber-criminals Turn on Each Other: The Story of Lumma Stealer's Collapse

Normally when we write about a malware operation being disrupted, it's because it has been shut down by law enforcement. But in the case of Lumma Stealer, a notorious malware-as-a-service (MaaS) operation used to steal passwords and sensitive data, it appears to have been sabotaged by other cybercriminals.Lumma Stealer, also known as Water Kurita and Storm-2477, first came to prominence in 2022...
Blog

Fortra Tracks Fivefold Increase in Brokerage Attacks YoY

Throughout 2024, Fortra identified a steady increase in attacks targeting brokerage accounts. Year-over-year, attacks targeting these accounts experienced a growth of more than fivefold in the second quarter of 2025 compared to the same quarter of 2024.
Blog

Don’t Send Email? Your Domain Needs to Greenlight DMARC Anyway (and Fast)

There’s a common misconception: If organizations don’t use their domain to send email, they think DMARC is unnecessary. That couldn’t be farther from the truth. Imagine you don’t drive your car. You want to let everybody know that you don’t drive it, so if they see it around town, they know it’s not you - and something’s amiss. Fortra recently surveyed the top 10 million domains on the internet...
Blog

Cybersecurity Regulatory Landscape in Turkey: A Primer for Business

In the last few years, Turkey has found itself increasingly in the crosshairs of bad actors. In Q3 2023, phishing rose sharply with a 20% jump from the previous quarter and a 47% spike year-on-year. The country is also a key target for cyberattacks on industrial control systems. Cyber threats travel fast, while laws usually do not, but in Turkey, that gap is narrowing. What started as a bunch of...
Blog

NCSC Warns Companies to Prepare for a Day When Your Screens Go Dark

The UK's National Cyber Security Centre (NCSC) has warned that the country faces an average of four "nationally significant" cyberattacks each week - a sharp 129% increase from the previous year.Of a total of 429 incidents handled by the NCSC, a record 204 were classified as nationally "significant," and 18 ranked even more seriously as "highly significant" (meaning that they had the potential to...
Blog

October 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s October 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-47827The first exploitation detected CVE this month is a vulnerability discovered by Zack Didcott that was disclosed in May...
Blog

Billions in Cybersecurity Undermined by a Single User. Why People Security Management Is Vastly Underrated

It was the most significant breach ever reported, but its origins were not uncommon. The 2024 Change Healthcare ransomware attack, which affected 190 million individuals and came with a price tag of $2.6 billion (and counting), started with an unauthorized intrusion.We spend billions of dollars annually on the best cybersecurity equipment innovated to date, but more and more, attackers are skating...