Resources

Guide

CISO Guide: Defending the Brand

The exposed vulnerabilities that come with online platforms create new challenges for organizations. While the popularity of social media, websites, e-commerce sites, and mobile apps has opened up remarkable opportunities for brands to connect with their audiences, new threats are lurking. This guide explores digital brand protection and who owns the...
Guide

2023 Domain Impersonation Report

Leveraging look-alike domain incident data, this report illustrates how look-alike domains are being used to target brands, common email display name spoofing techniques and most abused TLDs.
On-Demand Webinar

2024 Brand Threats and Fraud Webinar

In the first half of 2024, Fortra detected and mitigated millions of external threats targeting a broad range of enterprises and their brands. In this webinar, Fortra experts will review the newly-released 2024 Brand Threats and Fraud Report, provide insight into the latest trends shaping the threat landscape, and discuss mitigation tactics.
Guide

2024 Brand Threats and Fraud Report

To bolster your organization’s cybersecurity, you need to assess the threat actors’ capabilities and tactics. Fortra analyzed hundreds of thousands of domain, social media, counterfeit, and dark web cyberattacks targeting organizations including one that saw an 80% YoY increase!In this Brand Threats and Fraud Report, Fortra experts detail key threat...
On-Demand Webinar

Proaktive Cyberabwehr - Digitale Risiken minimieren mit PhishLabs

Erfahren Sie, wie Sie die Lösungen von PhishLabs nutzen können, um Ihre Cyberabwehr proaktiv zu gestalten und digitale Risiken effektiv zu minimieren.Dieses Video beinhaltet:- Wie Sie Bedrohungen frühzeitig erkennen und abwehren können.- Welche Strategien zur Risikominimierung am effektivsten sind.- Wie PhishLabs Ihnen helfen kann, Ihre Sicherheitsinfrastruktur zu stärken...
On-Demand Webinar

Identify and Disrupt Threats Before Attackers Strike

Join us as Fortra experts detail expanded capabilities, insight, and anti-threat measures to better address blind spots, proactively disrupt threat actors, prevent fraud, and enrich security. Attendees will learn about the newly expanded capabilities, including: Compromised Credentials Monitoring enables users to proactively defend against fraud...
On-Demand Webinar

Social Platform Impersonations: Types, Consequences, and Defenses

Social media is bigger than ever and threats are getting more sophisticated, but gone are the days when people could simply request to have an impersonation removed. Learn how to sift through the social media threat noise and get effective mitigation of social media threats including impersonations.
On-Demand Webinar

2023 Domain Impersonation Report - Key Findings

2023 Domain Protection Report – Key Findings The average brand is targeted by 40 look-alike domains per month. Domain impersonation is the foundation for a multitude of online threats. Watch Elyse Neumann, Fortra’s Sr. Director of Client Operations, and Eric George, Fortra’s Director of Solutions Engineering, as they discuss the key findings from...
Guide

Disrupt Counterfeit Threats

Counterfeit threats, such as fraudulent ads and look-alike domains, are on the rise especially with the expansion of e-commerce and online consumer-to-business interaction. However, the collection and mitigation of counterfeit activity can be complicated. Prioritizing relationships with platforms and providers along with collecting data showing evidence of abuse can accelerate the mitigation...
Video

On-Demand Webinar: Handling Threats That Land in User Inboxes

The risk of a user receiving a socially engineered attack is higher than ever, and technological solutions often miss the most devastating of them. Though technology is both an important and required component in protecting the enterprise, security teams need to remain vigilant and educated on quickly identifying threats which make it past...
Video

Digital Risk Protection: Evolving Your Cyber Threat Intel Program Into Action

Now Available On-demand Digital Risk Protection is an emerging technology that is on the rise in Gartner’s latest Hype Cycle for Security Operations. In this webinar, PhishLabs’ Manager of Solutions Engineering, Eric George, will break down Digital Risk Protection, explain how it works, and share recent use cases. You will learn how enterprises use...
Video

Domain Protection Best Practices Webinar

Domains are the cornerstone of an organization’s digital presence and IT infrastructure, which means domains are also lucrative to cybercriminals who use domain impersonation to create fake email addresses and websites for personal gain. Organizations cannot afford to keep domain protection out of their overall cybersecurity strategy. Watch Eric...
Video

Key Insights from the 2023 Cyberthreat Defense Report

Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge The 2023 Cyberthreat Defense Report provides deep insight into the perspectives of cybersecurity professionals. Join us to learn what your peers are thinking and doing Thursday, May 4, at 11 a.m. ET. Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge, will present...
Video

Emerging Threats: Disrupt Counterfeit Activity Targeting Retail Brands

Eric George, Director of Solution Engineering at PhishLabs As retail brands expand their online presence to selling goods and engaging with consumers, threat actors are leveraging the credibility of reputable organizations to profit off of cannibalized sales. Counterfeit storefronts mimic legitimate brands using look-alike domains, copyrighted...
Guide

Brand Threats Masterclass

To better understand the top brand risks, Fortra held a roundtable discussion with experts specializing in social media, dark web, email security, domains, and credential theft. Highlighting recent, real-world examples, participants provide insight into brand protection strategies that organizations can apply to their security playbooks today....
Guide

Ransomware Playbook

Ransomware operators are disabling critical systems and publishing stolen data in record volumes, and businesses that fall prey to an attack often feel helpless determining a solution because the threat itself is in a constant state of evolution.This playbook breaks down how to:Identify and mitigate attacks before they occurMaintain broad visibility into data leaks and threat actor activityPrepare...
Guide

Domain Impersonation Whitepaper

Cybercriminals target company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.It’s crucial that companies take preventive measures against look-alike domains and spoofing to safeguard their digital presence and IT infrastructure,...