Resources

Live Webinar
In the first half of 2024, Fortra detected and mitigated millions of external threats targeting a broad range of enterprises and their brands. In this webinar, Fortra experts will review the newly-released 2024 Brand Threats and Fraud Report, provide insight into the latest trends shaping the threat landscape, and discuss mitigation tactics. Attendees will learn: How...
Blog

What Are External Security Threats in Cybersecurity?

According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name...
Live Webinar
In this German webinar, you will learn how to proactively design your cyber defense and effectively minimize digital risks using PhishLabs solutions. Our experts will demonstrate practical insights on:How to detect and counter threats earlyWhich strategies are most effective for risk minimizationHow PhishLabs can help strengthen your security infrastructureDeutscheIn diesem...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Cyberattack anatomies are a detailed outline of various attack methodologies, techniques, and tactics. This blog post will outline the anatomy of a recent smishing campaign identified by Fortra’s threat researchers. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader to visit the...
Blog

Active Phishing Campaign: Tax Extension Help Lure

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender VerificationSender’s Email: ogawa@kidscorp[.]jp Sender’s Name: Beth KolcunReply-To Address: beth...
Blog

Active Phishing Campaign: Yousign HR Lure

A new, sophisticated active phishing campaigns focuses on malicious emails that leverage Yousign e-signature services to carry out phishing attacks. Learn more about this tactic through examples, high-level details, and associated threat indicators.
Datasheet

Intelligence Assessments

Fortra’s PhishLabs Intelligence Assessments provide a better understanding of the threat landscape, threat actor behavior, and the types of threats targeting organizations. Learn how Intelligence Assessments leverage a combination of threat intelligence feeds, advanced analytics, and expert analysis to help organizations enhance their cybersecurity posture.
On-Demand Webinar

Identify and Disrupt Threats Before Attackers Strike

Join us as Fortra experts detail expanded capabilities, insight, and anti-threat measures to better address blind spots, proactively disrupt threat actors, prevent fraud, and enrich security. Attendees will learn about the newly expanded capabilities, including: Compromised Credentials Monitoring enables users to proactively defend against fraud...
On-Demand Webinar

Social Platform Impersonations: Types, Consequences, and Defenses

Social media is bigger than ever and threats are getting more sophisticated, but gone are the days when people could simply request to have an impersonation removed. Learn how to sift through the social media threat noise and get effective mitigation of social media threats including impersonations.
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals. Today, it is considered widely used for phishing purposes.
Datasheet

Fortra Threat Intelligence Services

Fortra’s Threat Intelligence services empower enterprises to take proactive measures against threats by delivering critical insight to disrupt threat actors, prevent fraud, and enrich security controls.
Datasheet

Dark Web Monitoring

See how Fortra's Threat Intelligence services empower enterprises to take proactive measures against threats by delivering critical insight to disrupt threat actors, prevent fraud, and enrich security controls.
Blog

Dark Web Actors Overwhelmingly Target Card Data, Finance in Q4

Credit unions were the top targeted industry on the Dark Web in Q4 2023, continuing its lead over the historically targeted banking industry for the third consecutive quarter. Financials as a whole continue to be a primary focus of criminal groups on underground channels, with more than 91% of malicious activity directed at either credit unions, banks, financial services, or payment services.Every...
Blog

Social Media Attacks Focus on Financials, Executives in Q4

In Q4, impersonation threats made up more than 45% of total attacks on social media, with the vast majority targeting banking and financial services. Impersonation on social media continues to grow, with threats specifically targeting corporate executives responsible for driving the majority of volume for three consecutive quarters.The average number of social media attacks per business has...
Blog

DarkLoader Leads Malware Attacks in Q4

In Q4, three malware families represented more than 93% of all payload volume targeting end users, with Malware-as-a-Service (MaaS) DarkLoader leading all other reports. Fortra first received reports of DarkLoader in user inboxes in Q3, with attack volume picking up significantly beginning in October. The shift to criminal activity associated with DarkLoader comes after coordinated efforts by...
Datasheet

Compromised Credentials Monitoring

Learn how PhishLabs Compromised Credentials Monitoring can deliver broad visibility allowing organizations to quickly respond and implement countermeasures such as forced password resets and lockouts to guard against potential account takeovers, breaches, and malware attacks.