News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Live Event
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
News Article
Dark Reading: Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
By Tyler Reguly on Fri, 03/15/2024
Tyler Reguly spoke with Dark Reading about Microsoft’s Patch Tuesday security update for March.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
News Article
PYMNTS: FBI Sounds Alarm on AI-Driven Infrastructure Hacking
By Antonio Sanchez on Thu, 03/14/2024
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
News Article
IT Nerd: Phishing-as-a-Service group LabHost Targeting Canadian Banks
Mon, 03/04/2024
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd . Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of...
News Article
IT Nerd: Tips to Safeguard Against Tax Vishing Scams
By John Wilson on Fri, 03/01/2024
Tax-related phishing and vishing scams are rising during tax season. John Wilson shares valuable tips on how to spot those scams and stay safe.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.