Blog

Vulnerability Research

Patch Tuesday Update - November 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.54.0 and FVM Agent 2.15 releases.Microsoft addressed 89 vulnerabilities in this release, including 4 rated as Critical and 51 Remote Code Execution vulnerabilities.This release also includes fixes for two vulnerabilities that have been publicly disclosed and exploited in the wild.CVE-2024-43451 NTLM Hash Disclosure Spoofing...
Blog

BEC Global Insights Report: October 2024

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

Automated Data Classification: What It Is and How It Works

Automated data classification uses technology and algorithms to categorize and sort data automatically based on predefined criteria. The technology scans various data sets and accurately labels them according to their sensitivity and importance.This is a significant improvement over manual classification, as it is more efficient, less time-consuming,...
Blog

Friday Five: The Next Wave of Regulatory Compliance, Election Scams, & More

CISA Sees Elimination of 'Bad Practices' as Next Secure-by-Design Step by Matt BrackenThe Cybersecurity and Infrastructure Security Agency (CISA) has made significant strides in its secure-by-design initiative, gaining 230 software vendors' commitments to strengthen security features like multi-factor authentication and reducing default passwords. By shifting security responsibilities to software...
Blog

Where’s the Tipping Point? 6 Signs It’s Time for an MSSP

Explore six signs it’s time for your business to partner with a Managed Security Service Provider (MSSP). From rising security incidents to compliance demands and cost savings, learn how Fortra’s Alert Logic can strengthen your defenses with expert threat intelligence and 24/7 protection.
Blog

Friday Five: Real-Life Cyber Consequences, New Ransomware Stats, & More

As ransomware operators continue to expand the impact of their malware, CISA is proposing new requirements to help protect sensitive data, while the SEC is coming down on organizations that downplayed a historical breach. Learn all about these stories and more in this week's Friday Five.CISA Proposes New Security Requirements to Protect GOVT, Personal Data by BILL TOULASCISA has proposed security...
Blog

What Is Portion Marking? A Guide to Information Security Compliance

Portion marking is a document handling method for labeling the classification or sensitivity level of each part in classified or sensitive documents. Individual sections, such as paragraphs, headings, subheadings, figures, tables, etc., are marked to specify their classification level.These markings help ensure that each part of the document is handled, stored, and redacted or declassified...
Blog

Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More

HEALTHCARE'S GRIM CYBER PROGNOSIS REQUIRES SECURITY BOOSTER BY ROBERT LEMOSThe healthcare sector is increasingly vulnerable to cyberattacks, particularly ransomware, with 66% of organizations experiencing attacks in the past year, up from 60%. Emerging threats like the Trinity ransomware group are raising alarms, with cyberattacks like theirs disrupting services, exposing sensitive patient data,...