Datasheet
Executive Protection
Executives are high-value targets for cyber threat actors due to their public-facing roles, online presence, and influence. Their unique popularity and leadership styles make them increasingly vulnerable to a wide range of attacks, including account takeovers, spear-phishing, impersonation, protests, physical threats, and extortion. As their online profiles grow, so does the probability of...
Guide
Brand Threats Masterclass
To better understand the top brand risks, Fortra held a roundtable discussion with experts specializing in social media, dark web, email security, domains, and credential theft. Highlighting recent, real-world examples, participants provide insight into brand protection strategies that organizations can apply to their security playbooks today.
Guide
CISO Guide: Defending the Brand
The rapid growth of online platforms — social media, websites, e-commerce, and mobile apps — has unlocked powerful ways for brands to engage with customers. But with that visibility comes increased vulnerability. Today’s digital landscape introduces a range of external threats that put brand identity, reputation, and customer trust at risk.This guide...
Blog
Riskiest Social Media Platforms, Q4 2024
By Meriam Senouci on Thu, 12/19/2024
Every quarter, Fortra analyzes thousands of social media incidents to identify the top threats and trends plaguing organizations, their brands, and employees. Social media is a highly attractive environment to cyber attackers due to the large user base, constant flow of information, and the shift of younger generations relying more on social platforms for information instead of web searches. This...
Blog
Cloudflare’s pages.dev and workers.dev Domains Increasingly Abused for Phishing
By Meriam Senouci on Mon, 12/02/2024
Fortra has observed a rising trend in legitimate service abuse, with a significant volume of attacks targeting Cloudflare Pages. Workers.dev is a domain used by Cloudflare Workers’ deployment services, while Pages.dev is used by Cloudflare’s Pages platform that facilitates the development of web pages and sites. Fortra’s Suspicious Email Analysis (SEA) team has identified different threats being...
On-Demand Webinar
2024 Brand Threats and Fraud Webinar
By Sean Bell
In the first half of 2024, Fortra detected and mitigated millions of external threats targeting a broad range of enterprises and their brands. In this webinar, Fortra experts will review the newly-released 2024 Brand Threats and Fraud Report, provide insight into the latest trends shaping the threat landscape, and discuss mitigation tactics.
Blog
Active Phishing Campaign: Twilio SendGrid Abuse
By Meriam Senouci on Wed, 10/23/2024
Fortra has identified active phishing campaigns capable of evading email security gateways and filters. This analysis outlines key tactics, real-world examples, and related threat indicators. Sample Email Lure
Sample 1: Vishing Example
Sample 2: Office365 Phishing Example Sender VerificationAnalysis:...
Blog
UDRP Domain Takeover vs. Domain Takedown
By Ryan Newby on Tue, 10/22/2024
In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog
Active Phishing Campaign: QR Code Attachment O365 Attack
By Meriam Senouci on Wed, 10/16/2024
Fortra has identified active phishing campaigns capable of evading email security gateways and filters. This analysis outlines key tactics, real-world examples, and related threat indicators.Sample Email Lure
Sender VerificationSender’s Email: no-reply...
Blog
Active Phishing Campaign: Form Assembly Abuse
By Meriam Senouci on Wed, 10/09/2024
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. To protect the privacy of Fortra’s clients, the brand targeted in this attack has been anonymized and is generically referred to as “Brand” whenever their name appears in the...
Blog
What Are External Security Threats in Cybersecurity?
By Eric George on Tue, 09/03/2024
According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name...
Blog
What Is Tactical Threat Intelligence?
By Michael Tyler on Thu, 08/15/2024
Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog
Jack Henry Banno Integration Strengthens Brand Protection for PhishLabs Customers
Tue, 08/06/2024
PhishLabs announces an integration with digital banking platform, Jack Henry Banno. This new integration provides stronger brand protection for banks and credit unions against imposter phishing sites that steal customers' personally identifiable information (PII).
Case Study
Fortra Protects Regional Bank’s Customers and Brand from Phishing Attacks
Learn how Fortra helps HarborOne Bank improve the efficiency and capabilities of defending against phishing attacks, and how Customer Phishing Protection eliminates their team’s manual workload.
Blog
Cyberattack Anatomy: Banking Smish
By Meriam Senouci on Tue, 07/30/2024
Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack
The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog
Active Phishing Campaign: Tax Extension Help Lure
By Meriam Senouci on Wed, 06/05/2024
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure
Sender VerificationSender’s Email: ogawa@kidscorp[.]jp Sender’s Name: Beth KolcunReply-To Address: beth...
Datasheet
Intelligence Assessments
Fortra Brand Protection's Intelligence Assessments provide a better understanding of the threat landscape, threat actor behavior, and the types of threats targeting organizations. Learn how Intelligence Assessments leverage a combination of threat intelligence feeds, advanced analytics, and expert analysis to help organizations enhance their security posture.
On-Demand Webinar
Identify and Disrupt Threats Before Attackers Strike
Join us as Fortra experts detail expanded capabilities, insight, and anti-threat measures to better address blind spots, proactively disrupt threat actors, prevent fraud, and enrich security.Attendees will learn about the newly expanded capabilities, including:Compromised Credentials Monitoring enables users to proactively defend against fraud...
Blog
LabHost Wrapped - Notorious Phishing-as-a-Service Platform Taken Down
By Michael Tyler on Thu, 04/18/2024
One of the most used phishing-as-a-service platforms, LabHost, has been taken down by an international group of law enforcement authorities coordinated by Europol. Fortra has closely monitored LabHost and has mitigated tens of thousands of phishing attacks carried out by cybercriminals using the platform in recent years.