Blog

Blog

What is SNMP? How SNMP Works

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
Blog

Free decryptor for victims of Phobos ransomware released

There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering files encrypted by both the notorious Phobos ransomware, and its offshoot 8Base. What is Phobos Ransomware?Phobos first emerged in late 2018, as a ransomware-as-a-service (RaaS) operation, working with affiliates to demand payment from victims...
Blog

Stop Cyber Threats Before They Cost You: Protecting Financial Services with Fortra

Two in three financial institutions faced cyberattacks in 2024, and that trend shows little sign of letting up. Because of their valuable data – hooked conveniently to direct financial information – FinServ organizations are perennial targets for hungry attackers. But this isn’t news to anybody. Financial institutions understand the threats, and for the most part, they are some of the most...
Blog

CVE-2025-1727 and Railway Cybersecurity

Learn about CVE-2025-1727, a high severity vulnerability that impacts railway systems, its impacts on critical infrastructure, and how federal compliance regulations can help defend against the threat of exploitation.
Blog

Beyond Compliance: Building Resilient Cybersecurity in Retail

It’s no revelation to say that compliance and security are not synonymous, but recent events have reinforced the maxim. Adhering to even the strictest data protection standards is no longer enough to protect retailers from increasingly sophisticated cyber threats.Instead, complete compliance needs to be paired with strategic, resilience-focused cybersecurity practices to combat risks facing retail...
Blog

Police dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader

"Operation Elicius", a joint international law enforcement operation involving Europol and police forces in Italy, France, and Romania, has successfully dismantled a Romanian ransomware gang that targeted network-attached storage (NAS) devices and arrested its suspected leader.The so-called "DiskStation Security" ransomware group has targeted and compromised NAS devices - particularly those...
Blog

Reduce Downtime on IBM Power with Live Partition Mobility (LPM)

According to the IBM i Marketplace Survey, nearly half of businesses rank High Availability (HA) and Disaster Recovery (DR) among their top IT concerns. A key component of this is minimizing downtime during planned server maintenance, whether upgrading to the latest IBM Power hardware, or applying disruptive critical platform firmware and VIOS updates. With cybersecurity as the top IT concern,...
Blog

Cybersecurity Regulatory Landscape in India: A Primer for Business

India's digital transformation has been profound. Online payments, smart technologies, and digital services have all changed the way its citizens live and conduct business. There are many opportunities, but as many risks. Millions of citizens now use platforms that didn't exist a few years ago, and with this shift has come a slew of new cyber threats.In fact, a recent study predicted that...
Blog

Cybersecurity Regulatory Landscape in Australia: A Primer for Business

Once a niche discipline, cybersecurity has become about national security, business continuity, and risk management. Around the world, governments are tightening controls, redefining accountability, and pushing for operational readiness. Australia is no exception, but it is taking a uniquely pragmatic path that is sector-aware yet in line with global frameworks.Understanding Australia's...
Blog

AiLock ransomware: What you need to know

What is AiLock?AiLock is a ransomware-as-a-service (RaaS) operation that first came to light in March 2025. Security researchers at Zscaler noted that they had identified a cybercriminal group extorting ransoms from organisations through threats.I'm guessing the threat was the usual story of "We've stolen your data and encrypted the files on your systems - pay up or we'll dump the information on...
Blog

July 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s July 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1164 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2025-49719The only publicly disclosed vulnerability this month is an information disclosure in Microsoft SQL Server. Successful...
Blog

Navigating the Complex World of Financial Services Compliance

Financial services compliance requirements exist for a critical reason: the industry is a top target for cyberattacks. These regulations are designed to enforce a baseline standard of protection, safeguarding organizations and their customers against escalating threats.However, there is one thing you must understand — being compliant does not mean you’re secure.According to Verizon’s 2025 Data...
Blog

Staying Ahead of Cloud Threats: Monitoring, Incident Response, and Compliance

The cloud threat landscape in 2025 is marked by speed, scale, and staggering complexity. This year's Top Threats to Cloud Computing Deep Dive 2025 from the CSA reads like a breach compendium: Toyota's misconfigured GitHub repos, the Snowflake supply chain incident, and a ransomware attack linked to CrowdStrike Falcon deployments all illustrate the evolving attack surface and the tremendous...
Blog

BEC Global Insights Report: June 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.