Join this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Join this live webinar on June 6th to learn more about AI and other document and forms management trends and how you can get started implementing them.
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd . Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of...
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
Airline customers need to be aware that their PII data could be for sale on the dark web. Nick Oram looks at how attackers use this data and provides tips on how to keep your data secure.
What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
Many organizations are concerned about QR code phishing or quishing because it can bypass existing security measures, making recipient awareness the key to protection. Steve Jeffery spoke to Cyber Security Intelligence about the threats of quishing and how to prevent them.
The dark net has emerged as a major boon for malicious actors. Nick Oram, Security Operations Manager at Fortra’s PhishLabs, spoke to Networking+ about whether network managers are aware of the threats the dark net poses.
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.