Blog
The Data Confidence Gap: Why Organizations Still Can’t Trust Their Data
By Madhu Dodda on Mon, 11/17/2025
In the era of big data, the ultimate irony is that many companies are too afraid to use their own.The data confidence gap has become a significant aspect of security discussions today, as different departments approach the table with varying metrics, and none of them align. For a company to use its information in a way that genuinely moves the business forward, every party that leverages that data...
Blog
What Does it Take to Deploy AI Successfully?
By Mike Reed on Fri, 11/14/2025
AI use is growing rapidly. Research from Stanford University found that 78% of organizations reported using the technology in 2024, up from 55% the previous year.Unfortunately, however, that speed of implementation often comes at the cost of security and the problem is that, in a mad dash to adopt AI and remain competitive, organizations are chasing innovation faster than they can secure and...
Blog
Cybersecurity in Uncertain Times: Lessons from PwC’s 2026 Digital Trust Insights
By Donnie MacColl on Thu, 11/13/2025
Cybersecurity has entered uncharted waters. The 2026 PwC Global Digital Trust Insights report makes this painfully clear. A rapidly shifting world, amplified by geopolitical turbulence and unprecedented technology leaps, is testing the limits of our cyber strategies.I read the numbers and paused. Sixty percent of business and tech leaders rank cyber risk investment among their top three strategic...
Blog
Leading AI Companies Accidentally Leak Their Passwords and Digital Keys on GitHub - What You Need to Know
By Graham Cluley on Wed, 11/12/2025
What has happened?Many of the world's top artificial intelligence companies are making a simple but dangerous mistake. They are accidentally publishing their passwords and digital keys on GitHub, the popular code-sharing website that is used by millions of developers every day.The problem was found by security researchers at Wiz who examined 50 leading AI firms, and discovered that 65% of them had...
Blog
November 2025 Patch Tuesday Analysis
By Tyler Reguly on Tue, 11/11/2025
Today’s Patch Tuesday Alert addresses Microsoft’s November 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-62215This privilege escalation vulnerability in the Windows Kernel has been rated by Microsoft as Important. Successful...
Blog
BEC Global Insights Report: October 2025
By John Farina on Mon, 11/10/2025
The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog
Threat Intelligence vs. Threat Data: What’s the Difference?
By Josh Davies on Fri, 11/07/2025
Organizations are still overwhelmed by what they’re told, and sold as, ‘Threat Intelligence.’ In reality it falls short, as its really just threat/IOC data.The term has been thrown around so often that its true meaning and value have been diluted. It’s time to set the record straight and restore the trust and respect that ‘Threat Intelligence’ deserves.Threat Data: What It Really IsThreat data is...
Blog
The Rising Tide of Cyber-Attacks Against the UK Water Sector
By Graham Cluley on Thu, 11/06/2025
Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years.The disclosure that attackers are probing the systems relied on to manage the delivery of safe drinking water to millions of households comes in newly-released information from the Drinking Water Inspectorate (DWI), following a...
Blog
Fortra Patch Priority Index for October 2025
By Lane Thames on Thu, 11/06/2025
Fortra's October 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Chromium, Internet Explorer, and Microsoft Edge (Chromium-based) that resolve 15 issues, including use-after-free, heap buffer overflow, inappropriate implementation, and remote code execution vulnerabilities.Next on the list are patches for...
Blog
Fortra's Q3 2025 Data Protection Advances: Enhanced User Experience and Expanded Platform Integration
Mon, 11/03/2025
Fortra's Q3 2025 data protection product updates mark a step torward the unified Fortra cyber platform while enhancing reliability and overall user experience.
Blog
What 20 Years Has Taught Him About What Security Needs - And Where It’s Going
By Dan Raywood on Mon, 11/03/2025
A good company is greater than the sum of its parts. But at Fortra, those parts are pretty good, too. Recently, we had a chance to sit down with Tyler Reguly, Associate Director, Security R&D at Fortra. A career cybersecurity veteran, Tyler graduated from Fanshawe College, where he developed and taught five courses on hacking and malware. He has contributed to various standards, including CVSSv3...
Blog
Top Threat Hunting Metrics & Outcomes
By Ian Ashworth on Thu, 10/30/2025
During August 2025, our analysts initiated 2,770 threat hunts across our customer base. Read more about the metrics uncovered.
Blog
Your AI Model Might Not Be Worth Using - Without the Right Data Security in Place
By Josh Davies on Wed, 10/29/2025
In the age of AI, data security does more than protect your information. It can determine how your business is run. Now, more than ever, companies rely on their data to make choices about product placement, new markets, consumer trends, investments, and more. Nowhere does the adage “put good in, get good out” apply more. Yet we still see companies that undervalue data security as the fundamental...
Blog
Does Your Cybersecurity Framework Need Rebuilding?
By Rohit Dhamankar on Mon, 10/27/2025
Rebuilding a cybersecurity framework is remarkably similar to renovating a home. It’s time consuming, expensive, and, frankly, something that most people try to put off. However, just like a burst pipe or house fire would force you to renovate your home, there are certain indicators and situations that should prompt an immediate framework rebuild, regardless of budget constraints. This might...
Blog
Creating a Winning Alliance: Bridging Security and Compliance
By Anthony Israel-Davis on Fri, 10/24/2025
Does there have to be tension between security and compliance? They’re certainly not the same, as I note in my previous blog, Security vs. Compliance: What’s the Difference? It’s never been fun to have to show your work, and nobody wants to be a nag, so how can the groups come together to create something stronger than the individual parts? Here are a few ways to create that winning alliance....
Blog
New Report: 33% of Breached Face Financial Trouble Due to Fines, Not Breach Itself
By Donnie MacColl on Thu, 10/23/2025
If the breach doesn’t get you, the fines will. According to the latest Cyber Readiness Report by SMB-focused insurer Hiscox, after being breached, one in three organizations were hit with fines large enough to impact their financial health.This could result from doing business in multiple markets - California, the EU, and Canada, for example - and accruing respective fines of thousands or even...
Blog
Cyber-criminals Turn on Each Other: The Story of Lumma Stealer's Collapse
By Graham Cluley on Wed, 10/22/2025
Normally when we write about a malware operation being disrupted, it's because it has been shut down by law enforcement. But in the case of Lumma Stealer, a notorious malware-as-a-service (MaaS) operation used to steal passwords and sensitive data, it appears to have been sabotaged by other cybercriminals.Lumma Stealer, also known as Water Kurita and Storm-2477, first came to prominence in 2022...
Blog
8 Network Projects to Finally Prioritize
By Kevin Jackson on Wed, 10/22/2025
Some network projects, like equipment upgrades, training initiatives, and reporting, just never seem to get done. For a pep talk and practical tips to get started, keep reading.
Blog
Fortra Tracks Fivefold Increase in Brokerage Attacks YoY
By Alexis Ober on Tue, 10/21/2025
Throughout 2024, Fortra identified a steady increase in attacks targeting brokerage accounts. Year-over-year, attacks targeting these accounts experienced a growth of more than fivefold in the second quarter of 2025 compared to the same quarter of 2024.