Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks.
Originally published in IT Nerd.
Excerpt:
“Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The...
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.