The dark net has emerged as a major boon for malicious actors. Nick Oram, Security Operations Manager at Fortra’s PhishLabs, spoke to Networking+ about whether network managers are aware of the threats the dark net poses.
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.
Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.
The increasing IBM i skills gap and the desire to eliminate the costs of operating a data center continue to encourage IBM i customers to begin their cloud journey. Migrating IBM Power workloads is a multifaceted process in which many IT teams have little to no experience performing. Our cloud migration bundle offers you the tools as well as the personnel necessary to successfully migrate to the c...
In a video featured on Help Net Security, Eric George discusses why brands should take domain impersonation threats seriously and highlights strategies to resolve this problem.
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Current Domain Threats, Trends, and Techniques
Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal.
In the 2023 Domain Impersonation Report, we review look-alike domain...
We live in a data-driven world. As businesses become more reliant on data and people are more aware of the importance of protecting their personal data, data protection becomes a core part of business success. Download this comprehensive guide to learn: What data protection is Why it is important How businesses can better protect the data they store and processComplete the form to access the guide...
How to Stop Look-Alike Domains and Spoofing
In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.
It’s crucial that companies take preventive measures against look-alike...
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
According to the latest research by Fortra’s PhishLabs, in Q1 2023, about a quarter of emails landing in inboxes were classified as “do not engage” or malicious. SC Media shared key insights from the report.
As businesses produce prolific amounts of data, security strategists need to know how to secure it. Without organizing new swaths of information, unstructured data could languish on servers and remain undetected and unprotected. Data protection services are built to help organizations take charge of their digital assets and create a culture of data hygiene that will ensure all data that comes into...
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...