Resources

Datasheet

Executive Protection

Executives are high-value targets for cyber threat actors due to their public-facing roles, online presence, and influence. Their unique popularity and leadership styles make them increasingly vulnerable to a wide range of attacks, including account takeovers, spear-phishing, impersonation, protests, physical threats, and extortion. As their online profiles grow, so does the probability of...
Guide

Brand Threats Masterclass

To better understand the top brand risks, Fortra held a roundtable discussion with experts specializing in social media, dark web, email security, domains, and credential theft. Highlighting recent, real-world examples, participants provide insight into brand protection strategies that organizations can apply to their security playbooks today.
Guide

CISO Guide: Defending the Brand

The rapid growth of online platforms — social media, websites, e-commerce, and mobile apps — has unlocked powerful ways for brands to engage with customers. But with that visibility comes increased vulnerability. Today’s digital landscape introduces a range of external threats that put brand identity, reputation, and customer trust at risk.This guide...
Blog

Riskiest Social Media Platforms, Q4 2024

Every quarter, Fortra analyzes thousands of social media incidents to identify the top threats and trends plaguing organizations, their brands, and employees. Social media is a highly attractive environment to cyber attackers due to the large user base, constant flow of information, and the shift of younger generations relying more on social platforms for information instead of web searches. This...
Blog

Cloudflare’s pages.dev and workers.dev Domains Increasingly Abused for Phishing

Fortra has observed a rising trend in legitimate service abuse, with a significant volume of attacks targeting Cloudflare Pages. Workers.dev is a domain used by Cloudflare Workers’ deployment services, while Pages.dev is used by Cloudflare’s Pages platform that facilitates the development of web pages and sites. Fortra’s Suspicious Email Analysis (SEA) team has identified different threats being...
On-Demand Webinar

2024 Brand Threats and Fraud Webinar

In the first half of 2024, Fortra detected and mitigated millions of external threats targeting a broad range of enterprises and their brands. In this webinar, Fortra experts will review the newly-released 2024 Brand Threats and Fraud Report, provide insight into the latest trends shaping the threat landscape, and discuss mitigation tactics.
Blog

Active Phishing Campaign: Twilio SendGrid Abuse

Fortra has identified active phishing campaigns capable of evading email security gateways and filters. This analysis outlines key tactics, real-world examples, and related threat indicators. Sample Email Lure Sample 1: Vishing Example Sample 2: Office365 Phishing Example Sender VerificationAnalysis:...
Blog

UDRP Domain Takeover vs. Domain Takedown

In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedowns? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by the Internet Corporation for Assigned Names and Numbers, UDRP is the...
Blog

Active Phishing Campaign: Form Assembly Abuse

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. To protect the privacy of Fortra’s clients, the brand targeted in this attack has been anonymized and is generically referred to as “Brand” whenever their name appears in the...
Blog

What Are External Security Threats in Cybersecurity?

According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Understanding how cyberattacks unfold is key to stopping them. In this blog, Fortra’s threat researchers break down the anatomy of a recent smishing campaign, revealing the tactics, techniques, and infrastructure behind the attack. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader...
Blog

Active Phishing Campaign: Tax Extension Help Lure

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender VerificationSender’s Email: ogawa@kidscorp[.]jp Sender’s Name: Beth KolcunReply-To Address: beth...
Datasheet

Intelligence Assessments

Fortra Brand Protection's Intelligence Assessments provide a better understanding of the threat landscape, threat actor behavior, and the types of threats targeting organizations. Learn how Intelligence Assessments leverage a combination of threat intelligence feeds, advanced analytics, and expert analysis to help organizations enhance their security posture.
On-Demand Webinar

Identify and Disrupt Threats Before Attackers Strike

Join us as Fortra experts detail expanded capabilities, insight, and anti-threat measures to better address blind spots, proactively disrupt threat actors, prevent fraud, and enrich security.Attendees will learn about the newly expanded capabilities, including:Compromised Credentials Monitoring enables users to proactively defend against fraud...