Blog

Blog

The Challenge of Securing Bluetooth Technology in Healthcare

It’s the age-old question: when does convenience undermine security? In the healthcare sector, the answer can literally spell the difference between life and death. As the Internet of Medical Things (IoMT) grows, wireless attacks abound. While not any harder to launch than against traditional IoT devices, these attacks are drastically more high-stakes and can use the Bluetooth and related...
Blog

What Is Data Governance? A Quick Guide

The explosion of data and the velocity of its delivery have compelled organizations to incorporate an integrated set of processes, practices, and policies to guide their data use. Data governance ensures there’s a well-defined, company-wide framework that can foster proper data stewardship.
Blog

LabHost Wrapped - Notorious Phishing-as-a-Service Platform Taken Down

One of the most used phishing-as-a-service platforms, LabHost, has been taken down by an international group of law enforcement authorities coordinated by Europol. Fortra has closely monitored LabHost and has mitigated tens of thousands of phishing attacks carried out by cybercriminals using the platform in recent years.
Vulnerability Research

Patch Tuesday Update - April 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.40.0 and FVM Agent 2.6 releases.Microsoft addressed 150 vulnerabilities in this release, including 3 rated as Critical and 67 Remote Code Execution vulnerabilities.This release also includes a fix for the Proxy Driver Spoofing Vulnerability (CVE-2024-26234) that has been exploited in the wild.CVE/AdvisoryTitleTagMicrosoft...