Fortra® Security & Trust Center

Blog

BEC Global Insights Report: October 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

October 2025 Patch Tuesday Analysis

window._wq = window._wq || []; _wq.push({ id: "azjzgmdiuk", options: { preload: "auto" } }); Today’s Patch Tuesday Alert addresses Microsoft’s October 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-47827The first...
Emerging Threats

Oracle Concurrent Processing

Fortra is actively researching a remote, unauthenticated vulnerability (CVE-2025-61882) in the BI Publisher Integration component of the Oracle Concurrent Process feature within Oracle E-Business Suite. Successful exploitation could allow an attacker to take over the Oracle Concurrent Process feature.
Emerging Threats

Cisco ASA and FTD - Zero Day

Fortra is actively researching two critical Cisco vulnerabilities, CVE-2025-20333 and CVE-2025-20363 that could allow attackers to execute arbitrary code on affected devices. CVE-2025-20333 enables authenticated users to gain root access through crafted HTTP requests and is actively being exploited in the wild. CVE-2025-20363 affects ASA, FTD, IOS, IOS XE, and IOS XR software and could allow both unauthenticated and low-privileged authenticated users to execute arbitrary code. On the same announcement, Cisco alerted about CVE-2025-203632, base score 6.5 – CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, which can let unauthenticated attackers bypass access controls. If exploited alongside CVE-2025-20333, it could enable full remote control of affected systems, significantly increasing risk. No workarounds are available, and Cisco highly recommends updating the latest software versions. If patching is not immediately possible, organizations should disable or limit HTTPS web services and restrict management interfaces to trusted subnets.
Security Advisory

Deserialization Vulnerability in GoAnywhere MFT's License Servlet

A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Blog

XMRig Targets Financial Industry

Executive SummaryThe Fortra Intelligence and Research (FIRE) team has discovered and aided in the mitigation of a malware campaign delivering an open-source cryptocurrency miner, known as XMRig. This campaign stands out to security researchers because cryptojacking or malicious cryptocurrency mining operations rarely target enterprise environments with these methods, and more frequently focus on...
Blog

September 2025 Patch Tuesday Analysis

window._wq = window._wq || []; _wq.push({ id: "ki4mql81xq", options: { preload: "auto" } }); Today’s Patch Tuesday Alert addresses Microsoft’s September 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.In-The-Wild & Disclosed CVEsCVE-2025-55234From the advisory...
Emerging Threats

Commvault Remote Code Execution

Fortra is actively researching a critical remote code execution (RCE) vulnerability in Commvault (CVE-2025-57788, CVE-2025-57789, CVE-2025-57790, CVE-2025-57791) that allows attackers to bypass authentication and execute code on affected systems. The primary recommendation is to upgrade affected Commvault versions to the patched releases immediately.