News Article
The Futurum Group: Black Hat 2024 Reflections: Security Challenges Demand Rethink on Tools and Processes
Mon, 09/23/2024
The Futurum Group’s analysis of Black Hat 2024 highlights how the growing complexity of cybersecurity tools is driving the need for streamlined platforms. Fortra is mentioned alongside other leading vendors for offering solutions that reduce tool sprawl, cut costs, and close security gaps.Originally published by The Futurum Group.Excerpt: "The cybersecurity market has long been driven by user...
News Article
Forbes: Critical Windows 10 Update Security Glitch Fix Confirmed By Microsoft
By Tyler Reguly on Thu, 09/19/2024
Microsoft has identified and confirmed a fix for a critical security vulnerability introduced by a recent Windows 10 update.
On-Demand Webinar
IBM i Education: The Business Value of Modern Job Scheduling
Watch this webinar on the true business value of a modern IBM i scheduling solution and how it can be used to keep you current with the leading IT trends.
Blog
Patch Tuesday Update September 2024
By Tyler Reguly on Thu, 09/12/2024
Today, we get four vulnerabilities that have seen active exploitation, one of which has also been publicly disclosed.
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
Live Webinar
10:00 - 10:45am CDT
Tom Huntington |
Chuck Losinski
News Article
Hosting Advice: Leading Cybersecurity Provider Empowers Businesses to Bolster Infrastructure Protection
By Rohit Dhamankar on Fri, 08/30/2024
Hackers are constantly changing their tactics and using new technologies to infiltrate systems, leaving companies in a constant battle to protect their security. In a recent Hosting Advice article, Rohit Dhamankar dives into how cyber threats keep evolving and why businesses need to tweak their security game.
RPG Toolbox Downloads
Pre-Installation NotesThe Toolbox software restores onto the IBM i as a Licensed Program named 4RPGBOX. After you restore this licensed program, the software will be contained in the library named RPGTOOLBOX.RequirementsTo install the Toolbox, the following requirements must be met:IBM i release 7.2 or greater installed on your IBM i.Your user id must have authority to the RSTLICPGM command.If you...
News Article
MSN: The Ultimate Bsod — This Windows Driver Security Flaw Could Crash Your Whole System, and Microsoft Is Still Yet to Fix It
Tue, 08/20/2024
Cybersecurity researchers have found a new vulnerability in Windows that allows threat actors to completely brick devices and cause serious data loss.
News Article
Neowin: Windows 11/10 system driver has BSOD-triggering CVE-2024-6768 flaw on fully updated PCs
Tue, 08/20/2024
Fortra’s discovery of CVE-2024-6768 comes on the heels of the Crowdstrike outage, which also led to the blue screen of death.
News Article
Tom’s Guide: Windows 10 and 11: A Flaw Causes the Blue Screen of Death, Even if Your PC Is up to Date
Tue, 08/20/2024
CVE-2024-6768 can cause a Blue Screen of Death on Windows 10 and 11 PCs, even if all updates have been applied. Fortunately, this vulnerability requires attackers to have physical access to the targeted machine.
News Article
Dark Reading: CLFS Bug Crashes Even Updated Windows 10, 11 Systems
Tue, 08/20/2024
A Fortra researcher found a simple bug in the Common Log File System (CLFS) driver that can instantly trigger the infamous blue screen of death across any recent versions of Windows.
On-Demand Webinar
BRMS Education Series: From Basic Setup to Advanced Features
Watch this webinar series from Sarah Jacob of Agile Technology and Fortra's Tom Huntington for education on BRMS basics and advanced tips.
News Article
Microsoft Threat Intelligence Podcast: Disrupting Cracked Cobalt Strike
By Bob Erdman on Thu, 08/15/2024
Bob Erdman appeared on this week’s Microsoft Threat Intelligence Podcast to discuss the joint effort between Microsoft and Fortra to tackle the illegal use of cracked Cobalt Strike software.
Blog
Patch Tuesday Update August 2024
By Tyler Reguly on Thu, 08/15/2024
The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
News Article
Adopting Zero Trust Podcast- Applying Vulnerability Management to Zero Trust: Insights from Fortra’s Tyler Reguly
By Tyler Reguly on Wed, 08/07/2024
Fortra’s Tyler Reguly was recently featured on the Adopting Zero Trust podcast, where he delved into the critical role of vulnerability management within a Zero Trust framework.
Blog
Open-Source IT Tools: Advantages, Disadvantages, and How Halcyon Compares
By Mike Davison on Mon, 08/05/2024
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
News Article
Supply Chain Digital: Fortra: How to Guard Against Supply Chain Attacks
By Theo Zafirakos on Mon, 08/05/2024
Supply chain cyberattacks can trigger widespread disruptions, impacting multiple business functions and areas with compounded, cascading effects. In this article in Supply Chain Digital, Theo Zafirakos outlines strategies companies can put in place to guard against supply chain attacks.