Blog
Police dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader
By Graham Cluley on Wed, 07/16/2025
"Operation Elicius", a joint international law enforcement operation involving Europol and police forces in Italy, France, and Romania, has successfully dismantled a Romanian ransomware gang that targeted network-attached storage (NAS) devices and arrested its suspected leader.The so-called "DiskStation Security" ransomware group has targeted and compromised NAS devices - particularly those...
Blog
Recapping the APWG Phishing Activity Trends Report from Q1 2025
By Meriam Senouci on Tue, 07/15/2025
APWG’s quarterly Phishing Activity Trends Report analyzes phishing trends and insights reported to APWG by their member companies and research partners. This blog provides a high-level overview of the latest phishing trends to watch out for, in addition to quotes and insights from Fortra experts.
Blog
Streamlined Management and Enhanced Integration: Fortra's Latest Data Protection Advances
Mon, 07/14/2025
Fortra's Q2 2025 data protection releases represent a significant step forward in making enterprise data protection both more powerful and more accessible.
Blog
Cybersecurity Regulatory Landscape in India: A Primer for Business
By Cybersecurity Experts at Fortra on Mon, 07/14/2025
India's digital transformation has been profound. Online payments, smart technologies, and digital services have all changed the way its citizens live and conduct business. There are many opportunities, but as many risks. Millions of citizens now use platforms that didn't exist a few years ago, and with this shift has come a slew of new cyber threats.In fact, a recent study predicted that...
Blog
Cybersecurity Regulatory Landscape in Australia: A Primer for Business
By Cybersecurity Experts at Fortra on Fri, 07/11/2025
Once a niche discipline, cybersecurity has become about national security, business continuity, and risk management. Around the world, governments are tightening controls, redefining accountability, and pushing for operational readiness. Australia is no exception, but it is taking a uniquely pragmatic path that is sector-aware yet in line with global frameworks.Understanding Australia's...
Blog
The Ultimate Guide to Cyber Hygiene: Understanding Cybersecurity Fundamentals
By Mark Bell on Wed, 07/09/2025
Preventing breaches means more than stopping attackers. It means following tried and true cyber hygiene best practices used by small businesses and large enterprises alike.
Blog
AiLock ransomware: What you need to know
By Graham Cluley on Wed, 07/09/2025
What is AiLock?AiLock is a ransomware-as-a-service (RaaS) operation that first came to light in March 2025. Security researchers at Zscaler noted that they had identified a cybercriminal group extorting ransoms from organisations through threats.I'm guessing the threat was the usual story of "We've stolen your data and encrypted the files on your systems - pay up or we'll dump the information on...
Blog
July 2025 Patch Tuesday Analysis
By Tyler Reguly on Tue, 07/08/2025
window._wq = window._wq || [];
_wq.push({
id: "nu4d3wvu8p",
options: {
preload: "auto"
}
});
Today’s Patch Tuesday Alert addresses Microsoft’s July 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1164 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2025-49719The only publicly...
Blog
Navigating the Complex World of Financial Services Compliance
Mon, 07/07/2025
Financial services compliance requirements exist for a critical reason: the industry is a top target for cyberattacks. These regulations are designed to enforce a baseline standard of protection, safeguarding organizations and their customers against escalating threats.However, there is one thing you must understand — being compliant does not mean you’re secure.According to Verizon’s 2025 Data...
Blog
Staying Ahead of Cloud Threats: Monitoring, Incident Response, and Compliance
By Cybersecurity Experts at Fortra on Mon, 07/07/2025
The cloud threat landscape in 2025 is marked by speed, scale, and staggering complexity. This year's Top Threats to Cloud Computing Deep Dive 2025 from the CSA reads like a breach compendium: Toyota's misconfigured GitHub repos, the Snowflake supply chain incident, and a ransomware attack linked to CrowdStrike Falcon deployments all illustrate the evolving attack surface and the tremendous...
Blog
BEC Global Insights Report: June 2025
By John Farina on Fri, 07/04/2025
The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog
Fortra Patch Priority Index for June 2025
By Lane Thames on Thu, 07/03/2025
Fortra’s June 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolves 2 issues, including out of bounds read/write and use after free vulnerabilities.Next on the list are patches for Microsoft Office, Word, Excel, PowerPoint, and Outlook. These patches resolve 14 remote code execution...
Blog
Swiss government warns attackers have stolen sensitive data, after ransomware attack
By Graham Cluley on Wed, 07/02/2025
The Swiss government has issued a warning after a third-party service provider suffered a ransomware attack, which saw sensitive information stolen from its systems and leaked onto the dark web. Radix a non-profit health foundation, works with various federal administrations across Switzerland in areas such as promoting good nutrition, healthy exercise, and helping individuals deal with addiction,...
Blog
Compliance Breakdowns: Making Sure They Only Happen Once
By Chris Reffkin on Tue, 07/01/2025
Cross-functional alignment is one of the most effective tools a CIO has for maintaining compliance in a fragmented regulatory environment. However, while many understand that disparate teams working together is “what it’s all about,” many CIOs may not yet realize that it’s their responsibility to take point for the process.Or, that a successful compliance outlook doesn’t mean perfection – it means...
Blog
Metadata Management: Organizing & Optimizing Your Data Assets
Mon, 06/30/2025
Discover what metadata is, its types, and why it's essential for organizing, managing, and enhancing data usability in today's digital landscape.
Blog
AI & Data Security: Enhancing Data Protection in the Digital Age
By Robbie Araiza on Mon, 06/30/2025
Discover how AI transforms data security with real-time threat detection, predictive analytics, and automation to boost protection from cyber attacks.
Blog
SafePay Ransomware: What You Need To Know
By Graham Cluley on Fri, 06/27/2025
What is the SafePay ransomware?SafePay is a relatively new ransomware threat that was first observed around September 2024. Like other ransomware, SafePay encrypts victims' files so they cannot be accessed, and then demands the payment of a cryptocurrency ransom for their recovery. As part of a "double extortion" tactic, the hackers behind SafePay also steal data from affected organisations and...
Blog
5 Reasons to Champion EdTech and 4 Challenges to Watch For
By Kevin Jackson on Wed, 06/25/2025
Two IT pros share how to champion secure, reliable EdTech.