News Article
Best Life: How to Identify Phishing Emails
Fri, 06/14/2024
Struggling to identify phishing emails? Theo Zafirakos shared valuable tips on how to spot email scams and stay safe.
On-Demand Webinar
How to Securely Deploy ACS and Use Encrypted Sessions
By Steve Sisk
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
On-Demand Webinar
Making the Most of the Audit Journal
By Amy Williams
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
News Article
Healthcare IT News: HHS Offers $50M to Help Providers Patch Ransomware Vulnerabilities
By Tyler Reguly on Fri, 06/07/2024
Is AI enough to help organizations keep up with constantly changing vulnerabilities? Tyler Reguly spoke with Healthcare IT News and shared his take on it.
News Article
ComputerWeekly: Critical Sharepoint, Qakbot-Linked Flaws Focus of May Patch Tuesday
By Tyler Reguly on Fri, 06/07/2024
Tyler Reguly spoke with ComputerWeekly about the elevation of privilege (EoP) vulnerability in Windows DWM Core Library.
News Article
Investopedia: How to Report Identity Theft
By John Wilson on Fri, 06/07/2024
What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
News Article
The Register: Prolific Phishing-Made-Easy Emporium LabHost Knocked Offline in Cyber-Cop Op
Tue, 05/07/2024
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
News Article
The Hacker News: Global Police Operation Disrupts 'LabHost' Phishing Service
Tue, 05/07/2024
One of the largest Phishing-as-a-Service (PhaaS) providers, LabHost was disrupted with over 30 people arrested worldwide.
News Article
BleepingComputer: LabHost Phishing Service With 40,000 Domains Disrupted, 37 Arrested
Tue, 05/07/2024
A major phishing service with over 40,000 domains was disrupted in a year-long global law enforcement operation.
News Article
ConsumerAffairs: Verizon Is the Target of Massive Phishing Attempt
By John Wilson on Tue, 05/07/2024
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
News Article
FOX59 News: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Fortra is warning Verizon customers to be on the lookout for a phishing campaign.
News Article
Yahoo Tech: Major Phishing Attempt Targeting Verizon Customers
Tue, 05/07/2024
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
On-Demand Webinar
How Fortra Enables Your Zero Trust Strategy
By Nick Hogg
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog
6 Pro Tips from the 2024 State of IBM i Security Study
Mon, 05/06/2024
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2024 State of IBM i Security Study!
News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Datasheet
Powertech RSA SecurID Agent for IBM i
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
Blog
Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting
Mon, 04/08/2024
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Blog
Cybercriminal Focus in the New Year – Top 2024 Threat Trends
By Jessica Ryan on Fri, 03/29/2024