Resources

Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

Security leaders around the world are dealing with the same challenges: hyperconnected environments, hyperdistributed workforces, and the shifting application of zero trust in an evolving digital landscape. Find out how they are navigating the changes in our first-ever State of Cybersecurity Survey results.
Blog

The Email Security Gaps in Your Cloud

The cloud has reshaped the way organizations operate and comes with its own vulnerabilities in email security. Discover how Fortra's Cloud Email Protection can deliver multi-faceted defense against advanced email threats to keep your organization safe
Blog

Google and Yahoo Take Stance on Email Authentication

Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. Discover what these requirements mean for your organization, the importance of having Domain-based Message Authentication, Reporting & Conformance (DMARC) in place, and how Fortra can help.
Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Blog

What Is Cybersecurity Maturity?

A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Blog

What’s It Like to Be in Product Strategy at Fortra?

The Fortra Product Strategy team delivers ongoing value to global customers through our best-in-class solutions and services. Learn how these visionaries collaborate with customers and others at Fortra to define how feature sets should evolve.
Blog

Threat Actor Profile: Strox Phishing-as-a-Service

Strox phishing-as-a-service has become one of the most complete phishing solutions for fraud actors available, offering advanced phishing kits, hosting services, mail spam scripts, and an automated market for selling stolen credentials. Uncover the origins, evolution, and impact of Strox, a prominent player in the world of online fraud.