Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Guide
How Fortra Supports the MAS TRM Notice and Guidelines
Download this guide to learn how Fortra's solutions can help your organization comply with the MAS TRM notice and guidelines.
On-Demand Webinar
BRMS Education Series: From Basic Setup to Advanced Features
Watch this webinar series from Sarah Jacob of Agile Technology and Fortra's Tom Huntington for education on BRMS basics and advanced tips.
Datasheet
Fortra’s Email Security Bundles Datasheet
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
News Article
Techopedia: FishXProxy: Dark Web’s Next-Gen ‘Ultimate Phishing Toolkit’ Alarms Experts
By Michael Tyler on Fri, 08/02/2024
In this Techopedia article, Michael Tyler discusses new phishing malware kit FishXProxy.
News Article
Cyber Defense Magazine: New Phishing Campaign Using AI Generated Emails, Human Live Chat to Target Social Media Business Accounts
By Michael Tyler on Fri, 06/28/2024
In this Cyber Defense Magazine article, Michael Tyler, Sr. Director of Security Operations at Fortra, discusses a sophisticated phishing campaign targeting Meta business accounts. He explains the tactics behind the campaign and shares tips to protect against it.
Article
How to Implement the CIS Controls and Benchmarks on IBM i
By Amy Williams on Mon, 06/24/2024
Discover what the CIS Benchmarks and Controls are, why IBM i organizations should implement them, and how Powertech can help.
News Article
Best Life: How to Identify Phishing Emails
Fri, 06/14/2024
Struggling to identify phishing emails? Theo Zafirakos shared valuable tips on how to spot email scams and stay safe.
On-Demand Webinar
How to Securely Deploy ACS and Use Encrypted Sessions
By Steve Sisk
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
On-Demand Webinar
Making the Most of the Audit Journal
By Amy Williams
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
News Article
Investopedia: How to Report Identity Theft
By John Wilson on Fri, 06/07/2024
What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
On-Demand Webinar
Why Don't Companies Role Swap?
Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
News Article
The Register: Prolific Phishing-Made-Easy Emporium LabHost Knocked Offline in Cyber-Cop Op
Tue, 05/07/2024
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
News Article
The Hacker News: Global Police Operation Disrupts 'LabHost' Phishing Service
Tue, 05/07/2024
One of the largest Phishing-as-a-Service (PhaaS) providers, LabHost was disrupted with over 30 people arrested worldwide.
News Article
BleepingComputer: LabHost Phishing Service With 40,000 Domains Disrupted, 37 Arrested
Tue, 05/07/2024
A major phishing service with over 40,000 domains was disrupted in a year-long global law enforcement operation.
News Article
ConsumerAffairs: Verizon Is the Target of Massive Phishing Attempt
By John Wilson on Tue, 05/07/2024
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
News Article
FOX59 News: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Fortra is warning Verizon customers to be on the lookout for a phishing campaign.