News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
News Article
IT Nerd: Phishing-as-a-Service group LabHost Targeting Canadian Banks
Mon, 03/04/2024
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd . Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of...
News Article
IT Nerd: Tips to Safeguard Against Tax Vishing Scams
By John Wilson on Fri, 03/01/2024
Tax-related phishing and vishing scams are rising during tax season. John Wilson shares valuable tips on how to spot those scams and stay safe.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
News Article
TechNewsWorld: Experts Advise Caution Before Scanning QR Codes
By Dr Steve Jeffery on Wed, 12/27/2023
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
News Article
Technology Record Winter 2023 Issue: Fight Phishing With a Simulation Solution
By Mike Devine on Fri, 12/22/2023
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Consumer Affairs: QR Code Scams Are About to Reach Dangerous Levels
By John Wilson on Wed, 12/13/2023
John Wilson spoke to Consumer Affairs about the rising threats of QR code scams and discussed cybercriminals' most common tactics.
News Article
Hacking Humans: Unmasking the Deceptive
By John Wilson on Thu, 11/23/2023
What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
page
CIS Critical Security Controls
The CIS Critical Security Controls are widely accepted as a foundational security reference point for the modern enterprise. Fortra’s advanced portfolio of solutions provides organizations with the tools they need to meet the Controls and advance their cybersecurity maturity.
Blog
INFOGRAPHIC: How to Protect Your Data from Spoofing Attacks
Tue, 09/19/2023
A social engineering attack needs only one thing to be successful: the trust of the targeted party. Here are 7 ways to protect against email spoofing.