Blog

Blog

Data Security for AI Explained

What Is AI Fools? AI Fools Week (also referred to as AI Fools: Stay Sharp!) is an annual cybersecurity awareness campaign created by the National Cybersecurity Alliance. Inspired by the spirit of April Fool’s Day, the campaign highlights how AI-powered pranks and deceptions can go beyond harmless jokes. AI Fools Week’s goal is to educate individuals and organizations on how to spot and avoid AI...
Blog

World Leaks Data Extortion: What You Need to Know

What Is World Leaks?World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid.Hang on - Isn't That Just Ransomware by Another Name?Well, you can think of it like that if you want - but traditional ransomware attacks involve two things: stealing and encrypting your data, followed by demands for payments...
Blog

Stopping Zero-Day Threats with Cloud Email Security

What Is a Zero-Day Threat? A zero-day attack leverages a previously unknown vulnerability — one that hasn’t been detected by developers or security experts. Because the vulnerability is unknown, there is typically no existing patch or fix, leaving systems temporarily vulnerable until a solution can be developed and deployed. The term "zero-day" refers to the fact that defenders have "zero days" of...
Blog

Getting to Know Michael Oberlaender, CISO

Michael Oberlaender is an eight-time global CISO and currently provides CISO consulting services for organizations worldwide. His thirty-five-year career in IT and security have centered around the development of strategic, enterprise-grade security programs that empower business growth.We recently had the chance to speak to Michael about his thoughts on the industry, his start in cybersecurity,...
Blog

March 2026 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s March 2026 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.
Blog

Threat Actors Abuse GitHub Notifications to Deliver Vishing Attacks

Executive SummaryGitHub email notifications are being abused to deliver vishing content, according to findings from the Fortra Intelligence and Research Experts (FIRE) team. Vishing, or voice phishing, is a type of social engineering attack in which threat actors attempt to trick their victim into revealing personal information over a phone call or voice message, often beginning with an initial...
Blog

Skills, Tiers, and Security - The Challenges Your SOC Faces

For an outsider, it’s difficult to fathom what goes on in a SOC. It just looks like a mess of dashboards, screens, alerts, and stressed-out analysts. One might think that the SOC’s only purpose is to detect threats — but for those in the know, there’s much more to it than that.Capacity management, escalation decisions, and explaining to the board why everything costs as much as it does are all...
Blog

Your Staff Are Your Biggest Security Risk: AI Is Making It Worse

A new report claims that the cost of insider security incidents has surged 20% in two years, reaching an average of US $19.5 million per organization annually, with no sign that the alarming figure is flattening.That is one of the findings of the "Cost of Insider Risks Global Report" for 2026 from the Ponemon Institute and DTEX, which claimed that the main culprit is not malicious employees...
Blog

Emerging Financial Cybersecurity Threats in 2026

What Fintech Security Risks Are Emerging in Financial Services? It’s no surprise that financial institutions remain high-value targets for cyber threats with the US Federal Reserve reporting that cyber risks have become an “increasingly critical concern for the US financial system.”The growth of digital banking and fintech ecosystems gives way to increased reliance on cloud infrastructure and APIs...