Resources

News Article

IT Nerd: Phishing-as-a-Service group LabHost Targeting Canadian Banks

Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd . Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of...
News Article

VM Blog: Braving the Digital Risk & Email Security Landscape

How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
Blog

RPA vs. API: Differences and Use Cases

At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
News Article

Hacking Humans: Unmasking the Deceptive

What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
Blog

INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks

Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog

Untrustworthy Email in Inboxes Reaches All-Time High

In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%. Every quarter, PhishLabs...
Blog

A Day in the Life of a SOC Team

Managed detection and response (MDR) would be nothing without a SOC (security operations center). These are the people who make Alert Logic's MDR services so dependable. It’s time you met them.