Resources

On-Demand Webinar

Empowering Business Users with Secure Data Access

Fortra's Sequel Business Intelligence (BI) solution bridges the gap between complex data environments and the everyday user. Watch data access expert Greg Schmidt as he demonstrates how Sequel empowers business users.
Blog

Patch Tuesday Update January 2025

Microsoft definitely didn’t want to waste any time jumping into 2025 patching 161 CVEs with the January Patch Tuesday. There are 159 CVEs issued by Microsoft, 1 by CERT CC, and 1 by GitHub.
Blog

VERT Threat Alert: January 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In-The-Wild & Disclosed CVEsCVE-2025-21333The first of three Hyper-V vulnerabilities this month is a heap-based buffer overflow that leads to privilege escalation to SYSTEM. Microsoft has reported this...
Live Webinar
Want to make sure you’re getting the most out of the tools that you have available to you in Sequel? Our experts can help during this live webinar on February 18th!
Blog

BEC Global Insights Report: December 2024

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

Evolving Cyber Resilience

Explore how treating cybersecurity challenges like a biological ecosystem can simplify complexity, reduce redundancies, and build a resilient, adaptive security posture. Learn to classify problems, trace evolutionary patterns, and create a scalable cyber ecosystem for long-term success.