Resources

Video

Domain Protection Best Practices Webinar

Domains are the cornerstone of an organization’s digital presence and IT infrastructure, which means domains are also lucrative to cybercriminals who use domain impersonation to create fake email addresses and websites for personal gain. Organizations cannot afford to keep domain protection out of their overall cybersecurity strategy. Watch Eric...
Video

Key Insights from the 2023 Cyberthreat Defense Report

Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge The 2023 Cyberthreat Defense Report provides deep insight into the perspectives of cybersecurity professionals. Join us to learn what your peers are thinking and doing Thursday, May 4, at 11 a.m. ET. Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge, will present...
Video

Emerging Threats: Disrupt Counterfeit Activity Targeting Retail Brands

Eric George, Director of Solution Engineering at PhishLabs As retail brands expand their online presence to selling goods and engaging with consumers, threat actors are leveraging the credibility of reputable organizations to profit off of cannibalized sales. Counterfeit storefronts mimic legitimate brands using look-alike domains, copyrighted...
Guide

Brand Threats Masterclass

To better understand the top brand risks, Fortra held a roundtable discussion with experts specializing in social media, dark web, email security, domains, and credential theft. Highlighting recent, real-world examples, participants provide insight into brand protection strategies that organizations can apply to their security playbooks today....
Blog

VM Blog: Braving the Digital Risk & Email Security Landscape

How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry’s future and shares his seven predictions for 2024. Originally published in VM Blog. Excerpt: “AI and ML will enhance capabilities on both sides of the cyber landscape – for good and bad. On the defensive side, those protecting the targets will use advanced data...
Guide

Ransomware Playbook

Ransomware operators are disabling critical systems and publishing stolen data in record volumes, and businesses that fall prey to an attack often feel helpless determining a solution because the threat itself is in a constant state of evolution.This playbook breaks down how to:Identify and mitigate attacks before they occurMaintain broad visibility into data leaks and threat actor activityPrepare...
Guide

Quarterly Threat Trends & Intelligence May 2022

May 2022In Q1 of 2022, Agari and PhishLabs detected and mitigated hundreds of thousands of phishing, social media, email, and dark web threats targeting a broad range of enterprises and brands. The Quarterly Threat Trends & Intelligence Report provides an analysis of the latest findings and insights into key trends shaping the threat landscape.Readers will learn:How phishing attack volume changed...
Guide

Domain Impersonation Whitepaper

Cybercriminals target company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.It’s crucial that companies take preventive measures against look-alike domains and spoofing to safeguard their digital presence and IT infrastructure,...
Guide

Navigating Social Media Threats

Threat actors are using social media to target enterprises and their customers with fraudulent accounts. The nature of instant sharing on social media means organizations can face swift reputation damage or financial loss if they fall victim to one of the many threat types used on these platforms. In order to effectively protect against social media threats, security teams must be knowledgeable of...
Guide

How to Defend Against Look-alike Domain Threats

A Digital Risk Protection PlaybookLook-alike domains are one of the most versatile tools a threat actor can use to attack an organization. They lay the foundation for a wide range of cyberthreats, including reputation abuse, phishing sites, and email scams.This playbook breaks down:The domain lifecycle and how domains are abusedThreats criminals use to deceive and defraud their targetsHow look...
Guide

Fortra Wins 2022 Frost & Sullivan DRP Company of the Year

With its strong overall performance, Fortra earns the 2022 Frost & Sullivan Global Company of the Year Award in the DRP industry. With more than 60 years of coaching organizations all over the world, Frost & Sullivan provides the tools for growth and long-term success to their clients. Their Company of the Year Award is a great honor as it “exemplifies visionary innovation, market-leading...
Guide

Frost Radar: Digital Risk Protection (DRP) Services, 2022

See how Fortra stacks up against the biggest names in Digital Risk Protection. Frost and Sullivan’s 2022 DRP report gives you a better understanding of Digital Risk Protection vendors and what they have to offer. The report includes: Frost Radar on DRP Services Evaluation of the competitive environment Detailed analysis of vendors looking specifically at Innovation, Growth, and Frost...
Guide

2023 Cyberthreat Defense Report

Compare your company’s security practices with industry peers! The 2023 Cyberthreat Defense Report, now in it’s 10th year, provides deep insight into the minds of security professionals. Insights from this year’s survey include: The threats that most concern IT teams include account takeover (ATO) attacks, phishing, and brand impersonation on social media Double and triple extortion...
Blog

PhishLabs Blog Subscription

The PhishLabs Blog is where we share our insights, interviews, and videos about cybersecurity awareness and reducing digital threats. Sign up and we’ll keep you updated on interesting threats and scams, infosec news, events, and opinions on industry issues and trends. The blog newsletter will feature: Fresh industry content Somewhat entertaining videos The latest trends and defensive...
Blog

The Email Security Gaps in Your Cloud

It’s not news that most enterprises operate in the cloud. Migration to the cloud leads to better collaboration, data storage, and lower costs compared to on-premises resources. Odds are your organization is currently enjoying the conveniences of the cloud. The cloud has reshaped the way organizations operate, but with the migration comes new obstacles in email security, and the cloud has its own...
Blog

LastPass Fortra's PhishLabs Partnership: A Focus on Proactive Customer Protection Pays Off in 2023

As we approach the end of the year, LastPass Labs has reviewed the last 12 months to take account of the threat environment and how it has changed, as well as our accomplishments. Throughout 2023, the Threat Intelligence, Mitigation, and Escalations (TIME) team focused on rapidly expanding our capabilities to protect our customers from phishing sites and/or infostealers. A major part of this...
Blog

Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics

There is little doubt that AI-fueled impersonation campaigns and novel attacks via non-traditional channels have emerged as a primary concern for security teams. Brand impersonation is on the rise, with nearly 40 look-alike domains targeting brands each month. On social media, impersonation attacks account for almost half of all threatening content. And online counterfeit campaigns are...
Blog

Google and Yahoo Take Stance on Email Authentication

Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. At Fortra, we commend this push to require email authentication as a huge step in the ongoing fight against spoofing and abuse. But if the requirements are not in place by the deadline, certain emails may no longer be delivered. This could prove...
Blog

How Organizations Can Use Dark Web Intelligence

The scope of intelligence on underground marketplaces is vast and navigating the dark web in search of brand mentions and potential threats can be time-consuming and complex. In order to proactively defend against attacks and mitigate the threat of leaked information, organizations should consistently monitor marketplaces and forums for data pertaining to their brand. If questionable data is...
Blog

Q3 Payload Report

QBot, the leading payload family in Q3, was disrupted as part of a coordinated, multinational operation led by the FBI on August 29, 2023. This resulted in the removal of 700,000 QBot payloads from infected devices across the globe, and interrupted the activity of one of the most active malware families since the former juggernaut Emotet, which was disrupted in 2021. While QBot led all other...