Blog
Cybersecurity Regulatory Landscape in Italy: A Primer for Business
By Kirsten Doyle on Thu, 09/25/2025
As digital systems form the backbone of Italy’s public services and private industries, the regulatory landscape has had to intensify its focus on risk, resilience, and accountability. For global firms working in Italy or with Italians, knowing the rules keeps business running, guards their reputation, and keeps them out of trouble. Core Cybersecurity Regulations in Italy Italy’s regulatory...
Blog
INC ransomware: what you need to know
By Graham Cluley on Wed, 09/24/2025
What is INC Ransomware?INC is the name of a ransomware-as-a-service (RaaS) operation that first appeared in late summer 2023. Like many other cybercriminal groups, the administrators of INC provide the malware and infrastructure for the attacks. Affiliates of the INC ransomware group carry out the actual attacks themselves, sharing profits they make from blackmailing companies with the core team...
Blog
Cyber Defense vs. Cybersecurity: What’s the Difference, and Why Does It Matter?
By Katrina Thompson on Tue, 09/23/2025
Cyber defense and cybersecurity, while often used interchangeably, are two distinct terms with key differences.Understanding those differences can make all the difference in how you structure your security approach. Cyber Defense vs. Cybersecurity: The Key DifferencesCyber defense is what we think of when we think “cybersecurity,” ironically: the art of actively protecting your data against cyber...
Blog
VPN Replacement: Why You Need It and How to Find the Right One
By Katrina Thompson on Fri, 09/19/2025
When the industry outgrew the perimeter, it also outgrew VPNs. Now, VPN replacements are in high demand as organizations look for scalable, lightweight ways to secure distributed data in a distributed workforce.Understanding VPN and Its LimitationsVPNs were built for a bygone era, but fail to secure remote work, private data, or private applications today.VPN Security ChallengesSecuring VPNs is a...
Blog
Attackers exploit ActiveCampaign to Deliver Thousands of AI-generated SBA Phish
By Daud Jawad on Thu, 09/18/2025
A newly observed phishing campaign discovered by the Fortra Intelligence and Research Experts (FIRE) team is leveraging thousands of AI‑generated websites, via legitimate AI/Automation provider ActiveCampaign. Read on.
Blog
Your 8-Step Roadmap to Fintech Compliance
By Katrina Thompson on Thu, 09/18/2025
What Is Fintech Regulatory Compliance?Regulatory compliance in the fintech sector refers to the policies put in place governing the safe collection, storage, and use of sensitive customer data within fintech applications, online platforms, and digital services.These organizations are constantly evolving, pushing the envelope where digital progress is concerned. While banks offer the benefit of in...
Blog
From Mischief to Malware: ICO Warns Schools about Student Hackers
By Graham Cluley on Wed, 09/17/2025
Curiosity killed the cat and in today's classrooms it seems it is also crashing the school server, pinching teachers' passwords, and rewriting the lunch menu for a laugh.Recent data released by the UK's Information Commissioner's Office (ICO), highlights that the same curiosity for technology that can lead a young person into a career in cybersecurity can also lead them into trouble.According to...
Blog
To Patch or Not to Patch? How to Manage your CVEs in the Real World
By Katrina Thompson on Tue, 09/16/2025
From which patches you can skip to the effectiveness of a “golden image,” find out the tips and tricks of CVE management.
Blog
NIST SP 800-171 Revision 3: What It Means and How Defense Contractors Can Prepare
By Katrina Thompson on Fri, 09/12/2025
These days, defense contractors need to stay nimble where compliance is concerned. As technological threats advance, the need for clarity, specificity, and simplicity increases, leading to changes in the regulations that govern contractor cybersecurity. A recently released US Department of Defense (DoD) memo has spurred rumblings that the underlying NIST framework on which the DoD-mandated CMMC ...
Blog
XMRig Targets Financial Industry
By Israel Cerda on Thu, 09/11/2025
Executive SummaryThe Fortra Intelligence and Research (FIRE) team has discovered and aided in the mitigation of a malware campaign delivering an open-source cryptocurrency miner, known as XMRig. This campaign stands out to security researchers because cryptojacking or malicious cryptocurrency mining operations rarely target enterprise environments with these methods, and more frequently focus on...
Blog
From Inbox to Infrastructure: AI’s Role in Modern Cyber Threats
By Kirsten Doyle on Thu, 09/11/2025
AI is no longer science fiction. It is in the inbox. It is in the network. It is in every attack and every defense. Cyber attackers are learning fast. They use AI to scan, craft, and exploit. They automate what used to take hours. They personalize at scale. And defenders are racing to keep pace, building AI-driven tools to stop what attackers create. “Threat actors are constantly innovating and...
Blog
US charges suspected ransomware kingpin, and offers $10 million bounty for his capture
By Graham Cluley on Wed, 09/10/2025
A US federal court has unssealed charges against a Ukrainian national who authorities allege was a key figure behind several strains of ransomware, including LockerGoga, MegaCortex, and Nefilim. Volodymyr Viktorovich Tymoshchuk (who is also said to use the aliases "deadforz", "Boba", "msfv", and "farnetwork") has been charged for his alleged role in a series of ransomware attacks that extorted...
Blog
September 2025 Patch Tuesday Analysis
By Tyler Reguly on Tue, 09/09/2025
Today’s Patch Tuesday Alert addresses Microsoft’s September 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-55234From the advisory, “Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess...
Blog
How to Automate Vulnerability Management: Benefits, Best Practices, and FAQs
Mon, 09/08/2025
What Is Vulnerability Management Automation? At its core, vulnerability management (VM) is the continuous process of scanning an organization’s digital environment for exploitable weaknesses that could serve as entry points for cyberattacks, reporting and evaluating the findings, and remediating systems to remove detected weaknesses. For vulnerability...
Blog
Breaking the Chain - The Critical Role of Offensive Security in Cyber Defense
By Katrina Thompson on Mon, 09/08/2025
Offensive security practices—particularly penetration testing and red teaming—help organizations proactively disrupt the cyber attack chain. By simulating real-world attacks, offensive security identifies weak points across the kill chain stages (reconnaissance, weaponization, delivery, exploitation, installation, command & control, and actions on objectives) before threat actors can exploit them...
Blog
Beyond Red vs. Blue: Bring on the Purple Team
By Katrina Thompson on Fri, 09/05/2025
What Is a Purple Team?In cybersecurity, a purple team is a group that combines offensive red team capabilities with defensive blue team insights to provide a truly collaborative, well-balanced security posture. “Purple teaming” is more than a work group; it should be a philosophy.If you’re familiar with offensive security, red and blue team structures are well known. To review:Red Teams: Perform...
Blog
FBI warns seniors are being targeted in three-phase Phantom Hacker scams
By Graham Cluley on Wed, 09/03/2025
The FBI’s Internet Crime Complaint Center (IC3) says that the elderly are more at risk from falling victim to online fraud and internet scammers than ever before. In fact, according to the IC3's latest published annual report, seniors suffered a staggering US $4.885 billion dollars worth of losses last year - a 43% increase from 2023.
With an average...
Blog
Fortra Patch Priority Index for August 2025
By Lane Thames on Wed, 09/03/2025
Fortra's August 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.First on the list are patches for Chromium and Microsoft Edge (Chromium-based) that resolve use-after-free and inappropriate implementation vulnerabilities.Next on the list are patches for Microsoft Office, Word, Excel, PowerPoint, and Visio. These patches resolve 15 issues, including...
Blog
Machines Catch Yesterday’s Scams, Humans Stop Tomorrow’s
By Kirsten Doyle on Tue, 09/02/2025
Email is still the front door for attackers. And the door is wide open. Scammers now use the same tools defenders do. A bad actor with access to a large language model can generate flawless English, craft convincing requests, and sound exactly like a colleague or supplier. The result: emails that slip past traditional filters with ease. “By the time blocking rules and security have been built up...