Blog

Blog

The Rising Tide of Cyber-Attacks Against the UK Water Sector

Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years.The disclosure that attackers are probing the systems relied on to manage the delivery of safe drinking water to millions of households comes in newly-released information from the Drinking Water Inspectorate (DWI), following a...
Blog

How to Detect Look-alike Domain Registrations

Malicious domains play a central role in a wide range of cyberattacks that can severely damage a brand’s reputation. Spoofed domains are often quick and inexpensive to create, making them effective tools for launching phishing campaigns and distributing malicious emails. To identify and respond to domain-based threats targeting your organization, security teams must adopt advanced, well-defined...
Blog

Fortra Patch Priority Index for October 2025

Fortra's October 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Chromium, Internet Explorer, and Microsoft Edge (Chromium-based) that resolve 15 issues, including use-after-free, heap buffer overflow, inappropriate implementation, and remote code execution vulnerabilities.Next on the list are patches for...
Blog

What 20 Years Has Taught Him About What Security Needs - And Where It’s Going

A good company is greater than the sum of its parts. But at Fortra, those parts are pretty good, too. Recently, we had a chance to sit down with Tyler Reguly, Associate Director, Security R&D at Fortra. A career cybersecurity veteran, Tyler graduated from Fanshawe College, where he developed and taught five courses on hacking and malware. He has contributed to various standards, including CVSSv3...
Blog

Your AI Model Might Not Be Worth Using - Without the Right Data Security in Place

In the age of AI, data security does more than protect your information. It can determine how your business is run. Now, more than ever, companies rely on their data to make choices about product placement, new markets, consumer trends, investments, and more. Nowhere does the adage “put good in, get good out” apply more. Yet we still see companies that undervalue data security as the fundamental...
Blog

How to Combat Executive Impersonation on Social Media

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Does Your Cybersecurity Framework Need Rebuilding?

Rebuilding a cybersecurity framework is remarkably similar to renovating a home. It’s time consuming, expensive, and, frankly, something that most people try to put off. However, just like a burst pipe or house fire would force you to renovate your home, there are certain indicators and situations that should prompt an immediate framework rebuild, regardless of budget constraints. This might...
Blog

Creating a Winning Alliance: Bridging Security and Compliance

Does there have to be tension between security and compliance? They’re certainly not the same, as I note in my previous blog, Security vs. Compliance: What’s the Difference? It’s never been fun to have to show your work, and nobody wants to be a nag, so how can the groups come together to create something stronger than the individual parts? Here are a few ways to create that winning alliance....
Blog

New Report: 33% of Breached Face Financial Trouble Due to Fines, Not Breach Itself

If the breach doesn’t get you, the fines will. According to the latest Cyber Readiness Report by SMB-focused insurer Hiscox, after being breached, one in three organizations were hit with fines large enough to impact their financial health.This could result from doing business in multiple markets - California, the EU, and Canada, for example - and accruing respective fines of thousands or even...
Blog

Cyber-criminals Turn on Each Other: The Story of Lumma Stealer's Collapse

Normally when we write about a malware operation being disrupted, it's because it has been shut down by law enforcement. But in the case of Lumma Stealer, a notorious malware-as-a-service (MaaS) operation used to steal passwords and sensitive data, it appears to have been sabotaged by other cybercriminals.Lumma Stealer, also known as Water Kurita and Storm-2477, first came to prominence in 2022...
Blog

Fortra Tracks Fivefold Increase in Brokerage Attacks YoY

Throughout 2024, Fortra identified a steady increase in attacks targeting brokerage accounts. Year-over-year, attacks targeting these accounts experienced a growth of more than fivefold in the second quarter of 2025 compared to the same quarter of 2024.
Blog

UDRP Domain Takeover vs. Domain Takedown

In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog

Don’t Send Email? Your Domain Needs to Greenlight DMARC Anyway (and Fast)

There’s a common misconception: If organizations don’t use their domain to send email, they think DMARC is unnecessary. That couldn’t be farther from the truth. Imagine you don’t drive your car. You want to let everybody know that you don’t drive it, so if they see it around town, they know it’s not you - and something’s amiss. Fortra recently surveyed the top 10 million domains on the internet...
Blog

What Is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
Blog

Cybersecurity Regulatory Landscape in Turkey: A Primer for Business

In the last few years, Turkey has found itself increasingly in the crosshairs of bad actors. In Q3 2023, phishing rose sharply with a 20% jump from the previous quarter and a 47% spike year-on-year. The country is also a key target for cyberattacks on industrial control systems. Cyber threats travel fast, while laws usually do not, but in Turkey, that gap is narrowing. What started as a bunch of...