News Article
The Futurum Group: Black Hat 2024 Reflections: Security Challenges Demand Rethink on Tools and Processes
Mon, 09/23/2024
The Futurum Group’s analysis of Black Hat 2024 highlights how the growing complexity of cybersecurity tools is driving the need for streamlined platforms. Fortra is mentioned alongside other leading vendors for offering solutions that reduce tool sprawl, cut costs, and close security gaps.Originally published by The Futurum Group.Excerpt: "The cybersecurity market has long been driven by user...
News Article
Forbes: Critical Windows 10 Update Security Glitch Fix Confirmed By Microsoft
By Tyler Reguly on Thu, 09/19/2024
Microsoft has identified and confirmed a fix for a critical security vulnerability introduced by a recent Windows 10 update.
Blog
Patch Tuesday Update September 2024
By Tyler Reguly on Thu, 09/12/2024
Today, we get four vulnerabilities that have seen active exploitation, one of which has also been publicly disclosed.
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
News Article
Hosting Advice: Leading Cybersecurity Provider Empowers Businesses to Bolster Infrastructure Protection
By Rohit Dhamankar on Fri, 08/30/2024
Hackers are constantly changing their tactics and using new technologies to infiltrate systems, leaving companies in a constant battle to protect their security. In a recent Hosting Advice article, Rohit Dhamankar dives into how cyber threats keep evolving and why businesses need to tweak their security game.
News Article
MSN: The Ultimate Bsod — This Windows Driver Security Flaw Could Crash Your Whole System, and Microsoft Is Still Yet to Fix It
Tue, 08/20/2024
Cybersecurity researchers have found a new vulnerability in Windows that allows threat actors to completely brick devices and cause serious data loss.
News Article
Neowin: Windows 11/10 system driver has BSOD-triggering CVE-2024-6768 flaw on fully updated PCs
Tue, 08/20/2024
Fortra’s discovery of CVE-2024-6768 comes on the heels of the Crowdstrike outage, which also led to the blue screen of death.
News Article
Tom’s Guide: Windows 10 and 11: A Flaw Causes the Blue Screen of Death, Even if Your PC Is up to Date
Tue, 08/20/2024
CVE-2024-6768 can cause a Blue Screen of Death on Windows 10 and 11 PCs, even if all updates have been applied. Fortunately, this vulnerability requires attackers to have physical access to the targeted machine.
News Article
Dark Reading: CLFS Bug Crashes Even Updated Windows 10, 11 Systems
Tue, 08/20/2024
A Fortra researcher found a simple bug in the Common Log File System (CLFS) driver that can instantly trigger the infamous blue screen of death across any recent versions of Windows.
Product Video
Sequel Viewpoint Union Views
Watch this video to learn how to use Sequel's Union Views to merge data with no definable file relationships.
News Article
Microsoft Threat Intelligence Podcast: Disrupting Cracked Cobalt Strike
By Bob Erdman on Thu, 08/15/2024
Bob Erdman appeared on this week’s Microsoft Threat Intelligence Podcast to discuss the joint effort between Microsoft and Fortra to tackle the illegal use of cracked Cobalt Strike software.
Blog
Patch Tuesday Update August 2024
By Tyler Reguly on Thu, 08/15/2024
The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
News Article
Adopting Zero Trust Podcast- Applying Vulnerability Management to Zero Trust: Insights from Fortra’s Tyler Reguly
By Tyler Reguly on Wed, 08/07/2024
Fortra’s Tyler Reguly was recently featured on the Adopting Zero Trust podcast, where he delved into the critical role of vulnerability management within a Zero Trust framework.
Blog
Open-Source IT Tools: Advantages, Disadvantages, and How Halcyon Compares
By Mike Davison on Mon, 08/05/2024
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
News Article
Supply Chain Digital: Fortra: How to Guard Against Supply Chain Attacks
By Theo Zafirakos on Mon, 08/05/2024
Supply chain cyberattacks can trigger widespread disruptions, impacting multiple business functions and areas with compounded, cascading effects. In this article in Supply Chain Digital, Theo Zafirakos outlines strategies companies can put in place to guard against supply chain attacks.
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
On-Demand Webinar
IBM i in 2024: From AS400 to AI
Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
Quote
Get Custom Penetration Testing Services Pricing
Find Your VulnerabilitiesCore Security's Security Consulting Services (SCS) simulates trending and new cyber threats to uncover security weaknesses, comply with regulatory compliance standards, and strengthen your security landscape. See how affordable pen testing can be, complete the form and get a customized quote from our experts based on your security needs.Get More With Security Consulting...