Blog

Blog

Phishing-as-a-Service Profile: LabHost Threat Actor Group

Fortra continues to monitor malicious activity targeting Canadian banks by the Phishing-as-a-Service (PhaaS) group known as LabHost. Throughout 2022 and 2023, phishing campaigns linked to PhaaS platforms have surged, as threat actors increasingly rely on subscription-based services to execute attacks. These platforms offer a range of features, including stolen industry branding, real-time...
Vulnerability Research

Patch Tuesday Update - February 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.36.0 and Fortra VM Agent 2.4 releases.Microsoft addressed 73 vulnerabilities in this release, including 5 rated as Critical and 30 Remote Code Execution vulnerabilities.This release also includes fixes for CVE-2024-21351 and CVE-2024-21412 that have been exploited in the wild.Internet Shortcut Files Security Feature Bypass...
Blog

Cybersecurity and the Law: Taking Proactive Steps Before Needing Legal Action

How the justice system deals with cybercrime is still relatively new and finding its footing. How cybercriminals are leveraging the legal system is relatively new, too. Imagine a world where your organization gets hacked, and then, to add insult to injury, gets reported by the hackers for being out of compliance. Well, you don’t have to imagine too hard because those days are upon us. While the...
Blog

What Is Data Infrastructure? A Simple Overview

Data infrastructure - required to manage, store, and process data - can take many forms. We look at the different types, aspects, and provide tips on how to build a robust data infrastructure in today's blog.
Blog

Source Code Security Best Practices to Protect Against Theft

In many ways, source code is the backbone of the internet. Today's blog looks at source code security best practices that organizations need to follow, like using encryption and code analysis, to ensure its protected from theft and improper handling by employees.
Blog

A Guide to Enterprise Data Protection Best Practices

For most crafts, following best practices can help form a strong foundation. Enterprises looking to embrace data protection best practices should consider the following methods to ensure data - both company and user - is kept safe and secure.
Blog

Cybercriminal Focus in the New Year – Top Threat Trends

Cybercriminals are constantly refining their tactics to improve deliverability and increase the success of their campaigns. While email phishing remains one of the most persistent threats to organizations, many attacks now begin outside the inbox, using non-traditional lures or targeting users on platforms where they are more likely to engage.For security teams, keeping pace with where threats...