-
Alan Jordan |
Greg J. Schmidt
On-Demand Webinar
Why Don't Companies Role Swap?
Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
News Article
The Register: Prolific Phishing-Made-Easy Emporium LabHost Knocked Offline in Cyber-Cop Op
Tue, 05/07/2024
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
News Article
The Hacker News: Global Police Operation Disrupts 'LabHost' Phishing Service
Tue, 05/07/2024
One of the largest Phishing-as-a-Service (PhaaS) providers, LabHost was disrupted with over 30 people arrested worldwide.
News Article
BleepingComputer: LabHost Phishing Service With 40,000 Domains Disrupted, 37 Arrested
Tue, 05/07/2024
A major phishing service with over 40,000 domains was disrupted in a year-long global law enforcement operation.
News Article
ConsumerAffairs: Verizon Is the Target of Massive Phishing Attempt
By John Wilson on Tue, 05/07/2024
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
News Article
FOX59 News: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Fortra is warning Verizon customers to be on the lookout for a phishing campaign.
News Article
Yahoo Tech: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
On-Demand Webinar
IBM Access Client Solutions for System Administration
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
On-Demand Webinar
Control Costs and Boost Productivity with IBM i Automation
Tue, 03/19/2024
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
News Article
IT Nerd: Phishing-as-a-Service group LabHost Targeting Canadian Banks
Mon, 03/04/2024
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks.
Originally published in IT Nerd.
Excerpt:
“Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of...
News Article
IT Nerd: Tips to Safeguard Against Tax Vishing Scams
By John Wilson on Fri, 03/01/2024
Tax-related phishing and vishing scams are rising during tax season. John Wilson shares valuable tips on how to spot those scams and stay safe.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Datasheet
When to Use Robot HA, PowerHA, or Both
Discover the relationship between Fortra and IBM regarding Robot HA and PowerHA as well as when it is advantageous to use each one or both.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
Is the AS/400 Dead?
By Tom Huntington on Mon, 02/19/2024
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.