Blog

Blog

Patch Tuesday Update August 2024

The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Vulnerability Research

Patch Tuesday Update - August 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.48.0 and FVM Agent 2.10 releases.Microsoft addressed 86 vulnerabilities in this release, including 7 rated as Critical and 28 Remote Code Execution vulnerabilities.This release also includes fixes for six vulnerabilities that have been exploited in the wild.Microsoft Project Remote Code Execution Vulnerability (CVE-2024-38189...
Blog

What Are Data Classification Guidelines & Data Classification Techniques?

Organizations must constantly make decisions about their data. This can be challenging, especially given today’s high-frequency volume and variety.Data classification guidelines provide a structure for managing, protecting, and utilizing data effectively in an organization. By following the guidelines enumerated in this article, organizations can ensure a functional and effective data...
Blog

PII vs. SPI: Protecting Sensitive Information

Learn the key differences between Personally Identifiable Information (PII) and Sensitive Personal Information (SPI), as well as their definitions, examples, and regulatory requirements. Understanding these distinctions is crucial for effective data protection and compliance with evolving privacy regulations.
Blog

Data Security Policy Template: Tips & Free Download

A data security policy is an organization's set of guidelines and rules for managing and protecting its data assets. Learn what goes into a data security policy, how to implement one, and best practices in this new blog.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Managing the Rising Tide of CVEs 

If you are watching recent security stats, you’ll likely spot an alarming trend. Common Vulnerabilities and Exposures (CVEs) are on the rise and expected to increase by 25% in 2024, reaching 2,900 CVEs per month¹. It’s not a huge surprise that the number of known vulnerabilities is growing, given the proliferation of systems and software. Unfortunately, average time to remediation is increasing...
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

What Is Data Management? Strategies & Best Practices

Organizations must collect and manage data effectively to remain competitive in today’s digital world. Data management is a vital area of enterprise management, with good practices necessary for regulatory compliance, business intelligence, and competitive advantage.What Is Data Management?Data management refers to the process of collecting, storing, organizing, and using data efficiently,...