Blog

Blog

Is Buying Private Vulnerability Intelligence a Waste of Money?

We're seeing an interesting phenomenon where people want a simple, one-size-fits-all fix to assign prioritization to vulnerabilities, but it’s just not possible. Understanding the “why” is key to understanding the “what”: what teams have to do about it, and how that relates directly to whether your organization will get the hang of properly prioritizing what needs to be addressed.When you...
Blog

Getting to Know Bronwyn Boyle, CISO at PPRO

We recently had the chance to sit down with Bronwyn Boyle, CISO at leading fintech firm PPRO, a global payments platform that connects local transactions across borders.With three CISO positions under her belt, Bronwyn brings a wealth of experience to the finance and cybersecurity communities. She channels her perspective into tackling present-day industry problems and is an active advocate for...
Blog

Enhancing Your Security Posture with API Integrity Monitoring

API-driven configuration changes now shape most modern cloud and security environments, making traditional monitoring approaches incomplete. Without visibility into these API-level modifications, organizations risk unnoticed security drift and weakened controls. Implementing API integrity monitoring provides essential insight, accountability, and protection across cloud services, identity systems, and network devices.
Blog

Understanding AWS Data Security Risks

In today’s cloud-first world, Amazon Web Services (AWS) is a cornerstone of digital transformation, supporting everyone from fast-moving startups to global enterprises. Its flexibility and scale allow organizations to store, process, and analyze enormous volumes of data in minutes, accelerating innovation at a pace that was once unimaginable. But that level of capability also raises the stakes:...
Blog

BEC Global Insight Report: January 2026

Executive SummaryThe findings in this report come from the results of active defense engagements with BEC threat actors. Every month, Fortra Intelligence & Research Experts (FIRE) conducts hundreds of these engagements to collect comprehensive intelligence about BEC tactics and trends to help better understand how the BEC threat landscape is evolving. The primary findings for January 2026...
Blog

Urgent Warnings From UK and US Cyber Agencies After Polish Energy Grid Attack

A coordinated cyberattack that targeted Poland's energy infrastructure in late December 2025 has prompted cybersecurity agencies to issue urgent warnings to critical national infrastructure operators on both sides of the Atlantic.The attack, which Poland's Computer Emergency Response Team compared to "deliberate arson," targeted approximately 30 wind and solar farms, a heat and power plant, and...
Blog

What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI?

The viral AI work caricature trend on Instagram is prompting users to generate job‑based AI images, unintentionally exposing sensitive personal and professional information. This activity highlights how easily threat actors can identify potential targets, exploit publicly shared details, and attempt LLM account takeovers or prompt‑based data extraction. The trend underscores broader risks of shadow AI, including the leakage of proprietary or sensitive data when employees use public LLMs. Organizations are encouraged to strengthen AI governance, monitor for compromised credentials, and deploy data‑security tools to prevent unauthorized access and disclosure.
Blog

Common Data Protection Risks in Box Explained

Software as a Service (SaaS) efficiency dominates with more than 85% of business using at least one SaaS application. While it has widespread adoption, it does come with new data security risks. Some of the risks include companies that don’t comply with security standards and aren’t transparent about security. Also consider that allowing users remote access with any device can increase convenience...
Blog

February 2026 Patch Tuesday Analysis

window._wq = window._wq || []; _wq.push({ id: "pfkv3uwo6m", options: { preload: "auto" } }); Today’s Patch Tuesday Alert addresses Microsoft’s February 2026 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2026-21519A type...
Blog

Fortra Patch Priority Index for January 2026

Fortra's January 2026 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolves an insufficient policy enforcement vulnerability.Next on the list are patches for Microsoft Office, Word, and Excel. These patches resolve 11 issues...
Blog

The Security Paradox of Open Source Tools

The start of a new year is always a good time to take stock. In cybersecurity, one perennial problem - the persistence of “vintage” open source vulnerabilities like Heartbleed and Shellshock – should force us to ask some hard questions. Why do so many vulnerabilities persist in Open Source (OS) tools, and how do we fix the problem? In theory, OS tools should be more secure. In practice, it hasn’t...
Blog

AI is Changing the Attack Surface - Security Must Innovate

Security needs to be reevaluated in the context of AI, but not everything needs to change at once. Organizations that take a measured approach will do better, not giving into the AI hype cycle but recognizing the strategic ways AI is changing the game — and the ways it is changing security trajectories for the better.AI Is Weakening DefensesAI-enabled attacks are increasing, weakening existing...
Blog

Cobalt Strike 4.12: Fix Up, Look Sharp!

Cobalt Strike 4.12 is now available. We are excited to introduce a new look and feel for the Cobalt Strike GUI, a REST API, User Defined Command and Control (UDC2), new process injection options, new UAC bypasses, a new BOF API BeaconDownload for in-memory buffers, and new drip loading Malleable C2 options.Additionally, we have overhauled pivot Beacons so that they now support the novel Sleepmask...
Blog

Top Ways Employees Make Their Employers Vulnerable

The people factor is still the biggest variable in cyber resilience. Firewalls, EDR, and Zero Trust help, but everyday choices shape outcomes. The top ways employees make their employer vulnerable often come down to habits formed under pressure: clicking quickly, sharing widely, and trusting implicitly. Understanding those patterns — and changing them at scale — requires focusing on human risk...
Blog

What Is a Health Information System?

Learn what a health information system (HIS) is and how they're key to managing healthcare data, along with HIS benefits, best practices, and more.
Blog

Hacking Attack Leaves Russian Car Owners Locked Out of Their Vehicles

Imagine the scene. It's a cold Monday morning in Moscow. You walk out to your car, coffee in hand, ready to face the day. You press the button to unlock your car, and ... nothing happens. You try again. Still nothing. The alarm starts blaring. You can't turn it off.Welcome to Monday 26 January, 2026, and the chaos that was caused by a cyberattack on Delta - a Russian company that provides smart...
Blog

SEO Poisoning Marketplace Topping Search Results, Impersonating Top Financial Institutions

Introduction to the HaxorSEO MarketplaceFortra Intelligence and Research Experts (FIRE) have uncovered a group of active malicious threat actors operating since 2020. The group refers to themselves as Haxor, a slang word for hackers, and their marketplace as HxSEO, or HaxorSEO. HxSEO has established its primary base of operations and marketplace on Telegram and WhatsApp. HxSEO stands out for...