Blog

Blog

AiLock ransomware: What you need to know

What is AiLock?AiLock is a ransomware-as-a-service (RaaS) operation that first came to light in March 2025. Security researchers at Zscaler noted that they had identified a cybercriminal group extorting ransoms from organisations through threats.I'm guessing the threat was the usual story of "We've stolen your data and encrypted the files on your systems - pay up or we'll dump the information on...
Blog

July 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s July 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1164 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2025-49719The only publicly disclosed vulnerability this month is an information disclosure in Microsoft SQL Server. Successful exploitation of this vulnerability...
Blog

Navigating the Complex World of Financial Services Compliance

Financial services compliance requirements exist for a critical reason: the industry is a top target for cyberattacks. These regulations are designed to enforce a baseline standard of protection, safeguarding organizations and their customers against escalating threats.However, there is one thing you must understand — being compliant does not mean you’re secure.According to Verizon’s 2025 Data...
Blog

Staying Ahead of Cloud Threats: Monitoring, Incident Response, and Compliance

The cloud threat landscape in 2025 is marked by speed, scale, and staggering complexity. This year's Top Threats to Cloud Computing Deep Dive 2025 from the CSA reads like a breach compendium: Toyota's misconfigured GitHub repos, the Snowflake supply chain incident, and a ransomware attack linked to CrowdStrike Falcon deployments all illustrate the evolving attack surface and the tremendous...
Blog

BEC Global Insights Report: June 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

Fortra Patch Priority Index for June 2025

Fortra’s June 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolves 2 issues, including out of bounds read/write and use after free vulnerabilities.Next on the list are patches for Microsoft Office, Word, Excel, PowerPoint, and Outlook. These patches resolve 14 remote code execution...
Blog

Swiss government warns attackers have stolen sensitive data, after ransomware attack

The Swiss government has issued a warning after a third-party service provider suffered a ransomware attack, which saw sensitive information stolen from its systems and leaked onto the dark web. Radix a non-profit health foundation, works with various federal administrations across Switzerland in areas such as promoting good nutrition, healthy exercise, and helping individuals deal with addiction,...
Blog

Compliance Breakdowns: Making Sure They Only Happen Once

Cross-functional alignment is one of the most effective tools a CIO has for maintaining compliance in a fragmented regulatory environment. However, while many understand that disparate teams working together is “what it’s all about,” many CIOs may not yet realize that it’s their responsibility to take point for the process.Or, that a successful compliance outlook doesn’t mean perfection – it means...
Blog

SafePay Ransomware: What You Need To Know

What is the SafePay ransomware?SafePay is a relatively new ransomware threat that was first observed around September 2024. Like other ransomware, SafePay encrypts victims' files so they cannot be accessed, and then demands the payment of a cryptocurrency ransom for their recovery. As part of a "double extortion" tactic, the hackers behind SafePay also steal data from affected organisations and...
Blog

Cyberattacks Surge 650%: Insights from the IRIS Report

The latest Information Risk Insight Study (IRIS) highlights a 650% rise in significant cyber incidents over 15 years, with ransomware and infrastructure attacks on the rise. This blog explores key findings and shows how Fortra helps organizations respond to today’s evolving risks.
Blog

What Can You Monitor on Your Campus Network?

The better question is, what can't you monitor on campus? Intermapper provides education network monitoring for anything on your campus with an IP address. Check out the infographic to see examples of the possibilities. ...
Blog

Bert Ransomware: What You Need To Know

What is the Bert ransomware?Bert is a recently-discovered strain of ransomware that encrypts victims' files and demands a payment for the decryption key.Why is it called Bert?I truly have no idea. Maybe whoever created Bert put all of their efforts into the coding of their ransomware, rather than thinking of its marketing. Or maybe they just really like the name "Bert."Or maybe the hacker who...
Blog

BEC Global Insights Report: May 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

June 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s June 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1160 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2025-33053A WebDAV code execution vulnerability, CVE-2025-33053 requires that a user open a malicious .URL file for compromise to...
Blog

Fortra Patch Priority Index for May 2025

Fortra's May 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chromium that resolve 6 issues including spoofing, out of bounds memory access, insufficient data validation, inappropriate implementation, use after free, and heap buffer overflow vulnerabilities.Next on the...