News Article
The Futurum Group: Black Hat 2024 Reflections: Security Challenges Demand Rethink on Tools and Processes
Mon, 09/23/2024
The Futurum Group’s analysis of Black Hat 2024 highlights how the growing complexity of cybersecurity tools is driving the need for streamlined platforms. Fortra is mentioned alongside other leading vendors for offering solutions that reduce tool sprawl, cut costs, and close security gaps.Originally published by The Futurum Group.Excerpt: "The cybersecurity market has long been driven by user...
News Article
IT Brew: More Than Half of IT Professionals Aren’t Familiar With the Shared Responsibility Model
By Nick Franklin on Fri, 09/20/2024
A recent IT Brew article highlights a major cloud security gap: only 49% of surveyed IT and cybersecurity professionals are familiar with the "shared responsibility model," which defines the division of security duties between cloud providers and customers. Nick Franklin emphasized the common misunderstanding around these responsibilities, urging customers to ask their providers directly about what they are responsible for.
News Article
Reworked: How Security Service Edge Applications Enable Hybrid and Remote Work
By Wade Barisoff on Fri, 09/20/2024
Security Service Edge (SSE) applications are becoming essential for securing hybrid and remote work environments. In a recent article in Reworked, Wade Barisoff highlights which organizations are best suited for SSEs and how these solutions can enhance security effectively.
News Article
Forbes: Critical Windows 10 Update Security Glitch Fix Confirmed By Microsoft
By Tyler Reguly on Thu, 09/19/2024
Microsoft has identified and confirmed a fix for a critical security vulnerability introduced by a recent Windows 10 update.
News Article
DZone: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
By Antonio Sanchez on Fri, 09/13/2024
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
News Article
Enhancing Business Resilience & Combining Solutions to Maximize Email Protection
By Ravisha Chugh on Thu, 09/12/2024
Email is a leading gateway for cyberattacks, underscoring the need for businesses to prioritize strong email security. In VMblog, Ravisha Chugh emphasizes that to combat sophisticated threats like Business Email Compromise (BEC) and phishing.
Live Webinar
All day
Antonio Sanchez |
Josh Davies
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
News Article
Amazon Press Center: AWS Launches Global Passport Program to Accelerate Software Companies’ Growth and International Expansion
Fri, 09/06/2024
Amazon Web Services (AWS) announced the launch of its AWS Global Passport Program to help independent software vendor customers grow their businesses internationally. Fortra is one of the first participants in the program.
News Article
Hosting Advice: Leading Cybersecurity Provider Empowers Businesses to Bolster Infrastructure Protection
By Rohit Dhamankar on Fri, 08/30/2024
Hackers are constantly changing their tactics and using new technologies to infiltrate systems, leaving companies in a constant battle to protect their security. In a recent Hosting Advice article, Rohit Dhamankar dives into how cyber threats keep evolving and why businesses need to tweak their security game.
Blog
The Password Atmosphere – Problem, or Progress?
By Lisa Lombardo on Mon, 08/26/2024
Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog
What Is the NIST Risk Management Framework (RMF)?
By Antonio Sanchez on Mon, 08/26/2024
The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
RPG Toolbox Downloads
Pre-Installation NotesThe Toolbox software restores onto the IBM i as a Licensed Program named 4RPGBOX. After you restore this licensed program, the software will be contained in the library named RPGTOOLBOX.RequirementsTo install the Toolbox, the following requirements must be met:IBM i release 7.2 or greater installed on your IBM i.Your user id must have authority to the RSTLICPGM command.If you...
Blog
My Takeaways from Black Hat USA 2024
By Antonio Sanchez on Mon, 08/19/2024
The importance of resilience and business continuity dominated conversations at Black Hat USA 2024. In this blog, security expert Antonio Sanchez shares his take on this year’s event.
News Article
Forbes: New Windows 10 And 11 Blue Screen Of Death Warning Issued
By Ricardo Narvaja on Fri, 08/16/2024
Fortra recently uncovered a vulnerability in Windows that can cause a blue screen of death. Today, Fortra issued an advisory for Windows vulnerability CVE-2024-6768. Originally published in Forbes.Excerpt: “The potential problems include system instability and denial of service,” Ricardo Narvaja, principal exploit writer with security company Fortra, and the author of the report, said, “malicious...
Blog
89% of Security Awareness Programs Are Focused on Social Engineering in 2024
By Antonio Sanchez on Thu, 08/15/2024
Cybersecurity experts from over 70 countries share their insights, candor, and challenges when it comes to raising the level of cybersecurity awareness in their organizations. Learn how Fortra’s Terranova Security can help.
News Article
Microsoft Threat Intelligence Podcast: Disrupting Cracked Cobalt Strike
By Bob Erdman on Thu, 08/15/2024
Bob Erdman appeared on this week’s Microsoft Threat Intelligence Podcast to discuss the joint effort between Microsoft and Fortra to tackle the illegal use of cracked Cobalt Strike software.