News Article
Security Weekly: Email Impersonation Threats Reaching Corporate Inboxes Hit An All-Time High
By John Wilson on Mon, 08/21/2023
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
News Article
ABC11 EyewitnessNews: FBI Warns of Teens Being Targeted in Sextortion Scams
By John Wilson on Tue, 08/01/2023
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
News Article
Cybersecurity Insiders: The Looming Threat of Business Email Compromise
By John Wilson on Thu, 07/20/2023
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
News Article
SC Media: Malicious Emails Pelting Inboxes Hit All-time High in Q1, 2023
Tue, 07/18/2023
According to the latest research by Fortra’s PhishLabs, in Q1 2023, about a quarter of emails landing in inboxes were classified as “do not engage” or malicious. SC Media shared key insights from the report.
News Article
The Last Watchdog: Fortra Researchers Find Email Impersonation Attacks Climbing to an All-Time High
By John Wilson on Mon, 07/17/2023
John Wilson spoke to The Last Watchdog and discussed the key findings of Fortra’s recent research on business email compromise (BEC).
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
Guide
2023 Pen Testing Report
Over the years, penetration testing has become an integral component in proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved...
Datasheet
Advanced Red Team Bundle
Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) are three powerful security solutions that use the same techniques as today’s threat actors in order to safely evaluate organizational infrastructures and provide guidance on closing security gaps, enhancing defenses, and creating more resilient security strategies.
Core Impact is an automated penetration testing tool, typically...
On-Demand Webinar
Fortra’s Penetration Testing Solution for Offensive Security
By Nick Hogg
Cybersecurity is no longer a one-dimensional, defensive only mind-set. Attacks have become multi-pronged and organizational security solutions also need to act offensively. Proactive, layered offensive security should include multiple security solutions, including penetration testing, to uncover security risks before they’re exploited.
Fortra’s Core Impact enables security teams to go on the...
Blog
Are Cybersecurity and Data Protection Now Integral to Business Success?
Mon, 02/06/2023
A famous front cover of The Economist in 2017 declared that the 'world’s most valuable resource is no longer oil, but data.' The value of data has indeed increased significantly. Organizations rely on data and data analytics for almost every facet of their operations and use it to make insightful decisions to help move the business forward.
Many have invested in the tools and solutions - AI, CRM,...
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
On-Demand Webinar
Fortra’s Vulnerability Management Solutions for Proactive Security
By Nick Hogg
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions.
Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
Datasheet
Fortra Advanced Email Security Solutions
Since keeping the bad at bay is the rallying cry of the day, enterprises need comprehensive protection that spans the entire lifecycle of threats from the staging of email-borne threats outside your organization to active threats landing in the inbox. Fortra’s Advanced Email Security solutions do just this—whether you are operating in the cloud, in a hybrid environment, or on-prem through a complete solution, we can help you solve your toughest email security challenges.
On-Demand Webinar
Infrastructure Protection for Proactive Security
By Nick Hogg
Infrastructure Protection for Proactive Security
Today’s threat landscape is moving so rapidly that it’s essential to anticipate attacks and adapt your cybersecurity strategy to avoid becoming the next security breach. Such devastating breaches can cripple an organization, slowing or halting day-to-day operations and doing significant harm to a business’ reputation.
Join our infrastructure...
Case Study
SFT Threat Protection Helps Credit Card Company Securely Transfer Files
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.