Resources

Guide

What Experts Have to Say About Choosing the Right Cybersecurity Frameworks

How to Get the Most Out of Cybersecurity Best Practice Frameworks Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
Live Webinar
The transition period from PCI DSS 3.2.1 to 4.0 ended on March 31, 2024, a date toward which many organizations have dedicated countless hours of preparation. Looking back on that time, do you know where your compliance efforts stand now? Join PCI experts Steven Sletten and Jeff Hall for the live webinar PCI 4.0 Is Here: Your Guide to Navigating Compliance Success to learn how...
Live Event
Facing increased workloads, fewer resources, and waiting for someone to come save the day? Never fear, Fortra’s Automate is here! Automate takes the power of robotic process automation (RPA) to new heights using four distinct capabilities. These superpowers come together to turn anyone—regardless of coding experience—from a zero to an automation hero. Join Darrell Walker,...
Guide

2024 Pen Testing Report

Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide...
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Blog

Automated Integration: The Fuel for Your Digital Transformation

As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration, you could end up with a tangled mess of siloed applications and systems. And while automation and application...
Live Webinar
JavaScript injection is a very powerful action for web browser automations. This allows users to interact with a website exactly as the website is expecting. Adding JavaScript to Automate’s web browser actions takes your automation a step further, allowing users to build automation that controls the site as a human would when needed. Join Austin Stanley, Technical Consultant,...
News Article

IT Nerd: Phishing-as-a-Service group LabHost Targeting Canadian Banks

Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd. Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of...