Resources

On-Demand Webinar

2024 Brand Threats and Fraud Webinar

In the first half of 2024, Fortra detected and mitigated millions of external threats targeting a broad range of enterprises and their brands. In this webinar, Fortra experts will review the newly-released 2024 Brand Threats and Fraud Report, provide insight into the latest trends shaping the threat landscape, and discuss mitigation tactics.
Blog

UDRP Domain Takeovers vs. Domain Takedowns

What’s the difference between UDRP Domain Takeovers and Domain Takedowns?In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedown? Let’s take a closer look at the processes.What Is a UDRP Domain Takeover? Established by...
Guide

2024 Brand Threats and Fraud Report

To bolster your organization’s cybersecurity, you need to assess the threat actors’ capabilities and tactics. Fortra analyzed hundreds of thousands of domain, social media, counterfeit, and dark web cyberattacks targeting organizations including one that saw an 80% YoY increase!In this Brand Threats and Fraud Report, Fortra experts detail key threat...
Blog

What Is Tactical Threat Intelligence?

Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. Tactical threat intelligence also enables defenders to engage in threat hunting or root cause analysis activities when examining historical (attempted) intrusions. This is useful in detecting breaches that may have occurred, understanding the cause of a previous breach, and understanding whether a particular adversary or TTP is being attempted against your organization.
Blog

Cyberattack Anatomy: Banking Smish

Cyberattack anatomies are a detailed outline of various attack methodologies, techniques, and tactics. This blog post will outline the anatomy of a recent smishing campaign identified by Fortra’s threat researchers. The Smishing Attack The smishing text contains a banking alert about a transaction being put on hold and urges the reader to visit the...
Blog

Active Phishing Campaign: Yousign HR Lure

A new, sophisticated active phishing campaigns focuses on malicious emails that leverage Yousign e-signature services to carry out phishing attacks. Learn more about this tactic through examples, high-level details, and associated threat indicators.
On-Demand Webinar

Identify and Disrupt Threats Before Attackers Strike

Join us as Fortra experts detail expanded capabilities, insight, and anti-threat measures to better address blind spots, proactively disrupt threat actors, prevent fraud, and enrich security. Attendees will learn about the newly expanded capabilities, including: Compromised Credentials Monitoring enables users to proactively defend against fraud...
On-Demand Webinar

Social Platform Impersonations: Types, Consequences, and Defenses

Social media is bigger than ever and threats are getting more sophisticated, but gone are the days when people could simply request to have an impersonation removed. Learn how to sift through the social media threat noise and get effective mitigation of social media threats including impersonations.
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals. Today, it is considered widely used for phishing purposes.
Datasheet

Dark Web Monitoring

See how Fortra's Threat Intelligence services empower enterprises to take proactive measures against threats by delivering critical insight to disrupt threat actors, prevent fraud, and enrich security controls.
On-Demand Webinar

2023 Domain Impersonation Report - Key Findings

2023 Domain Protection Report – Key Findings The average brand is targeted by 40 look-alike domains per month. Domain impersonation is the foundation for a multitude of online threats. Watch Elyse Neumann, Fortra’s Sr. Director of Client Operations, and Eric George, Fortra’s Director of Solutions Engineering, as they discuss the key findings from...
Blog

Executive Attacks on Social Media Hit All-Time High as Analysts Point to AI

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Getting the Board on Board: Explaining Cybersecurity ROI

In this Tripwire guest blog, we break down how to best communicate the significance of a cybersecurity investment. Despite increasing data breaches, ransomware attacks, and assorted cyber threats, convincing the Board of Directors to invest in robust cybersecurity isn't always easy for many businesses. The challenge originates mainly from the need to demonstrate a quantifiable Return On...
Guide

Domain Impersonation Report

Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal.In this Domain Impersonation Report, we review look-alike domain incidents to determine the volume and most prevalent...
Guide

Disrupt Counterfeit Threats

Counterfeit threats, such as fraudulent ads and look-alike domains, are on the rise especially with the expansion of e-commerce and online consumer-to-business interaction. However, the collection and mitigation of counterfeit activity can be complicated. Prioritizing relationships with platforms and providers along with collecting data showing evidence of abuse can accelerate the mitigation...