Live Event
10:00 - 11:00am CDT
Greg J. Schmidt
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Product Video
Sequel Viewpoint Union Views
Watch this video to learn how to use Sequel's Union Views to merge data with no definable file relationships.
News Article
Microsoft Threat Intelligence Podcast: Disrupting Cracked Cobalt Strike
By Bob Erdman on Thu, 08/15/2024
Bob Erdman appeared on this week’s Microsoft Threat Intelligence Podcast to discuss the joint effort between Microsoft and Fortra to tackle the illegal use of cracked Cobalt Strike software.
Datasheet
Fortra’s Email Security Bundles Datasheet
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
News Article
Techopedia: FishXProxy: Dark Web’s Next-Gen ‘Ultimate Phishing Toolkit’ Alarms Experts
By Michael Tyler on Fri, 08/02/2024
In this Techopedia article, Michael Tyler discusses new phishing malware kit FishXProxy.
Blog
3 Components of a Proactive Security Strategy
By Mieng Lim on Mon, 07/22/2024
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
News Article
Cyber Defense Magazine: New Phishing Campaign Using AI Generated Emails, Human Live Chat to Target Social Media Business Accounts
By Michael Tyler on Fri, 06/28/2024
In this Cyber Defense Magazine article, Michael Tyler, Sr. Director of Security Operations at Fortra, discusses a sophisticated phishing campaign targeting Meta business accounts. He explains the tactics behind the campaign and shares tips to protect against it.
News Article
IT Nerd: Exclusive Insights from Fortra’s 2024 Penetration Testing Report
By Chris Reffkin on Fri, 06/28/2024
Fortra CISO Chris Reffkin spoke with IT Nerd and shared valuable insights from Fortra’s 2024 Penetration Testing Report.
Product Video
Sequel Data Warehouse ETL (Extract, Transform, Load) Overview and Demonstration
Wed, 06/26/2024
When data comes from all over your IT environment and is accessed in different ways by different users, your organization faces a lot of issues. Not only is the data inconsistent, but each database formats and delivers data differently. And there's no single filter through which all data goes to make sure it is high quality. That's where Sequel Data Warehouse can help. By accessing any data and...
On-Demand Webinar
How to Maximize Your BI Technology with a Data Warehouse
Watch this webinar to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
News Article
Best Life: How to Identify Phishing Emails
Fri, 06/14/2024
Struggling to identify phishing emails? Theo Zafirakos shared valuable tips on how to spot email scams and stay safe.
News Article
The Register: Prolific Phishing-Made-Easy Emporium LabHost Knocked Offline in Cyber-Cop Op
Tue, 05/07/2024
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
News Article
The Hacker News: Global Police Operation Disrupts 'LabHost' Phishing Service
Tue, 05/07/2024
One of the largest Phishing-as-a-Service (PhaaS) providers, LabHost was disrupted with over 30 people arrested worldwide.
News Article
BleepingComputer: LabHost Phishing Service With 40,000 Domains Disrupted, 37 Arrested
Tue, 05/07/2024
A major phishing service with over 40,000 domains was disrupted in a year-long global law enforcement operation.
News Article
ConsumerAffairs: Verizon Is the Target of Massive Phishing Attempt
By John Wilson on Tue, 05/07/2024
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
News Article
FOX59 News: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Fortra is warning Verizon customers to be on the lookout for a phishing campaign.