Resources

Blog

Identifying and Mitigating Email Threats

Email  threats are ever evolving, and it’s important to stay up to date. Here are the current most common email threats and how to identify and mitigate them. So, what are the most common types of email threats today? Business Email Compromise Ransomware Phishing Spear Phishing Data Breach Spam Keyloggers Domain Impersonation We’ll explain these and more. Then, we’ll...
Blog

It’s the Most Wonderful Time of the Year… for Cybercriminals

The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people...
Blog

How to Neutralize the Rising Threat of Ransomware

In IBM's "Cost of a Data Breach 2022" report, the average payout for ransom was $812,360. The steady payout incline suggests that ransomware remains big business for cyber criminals, particularly as successful execution means easy money without the need for malicious actors to worry about exfiltration of the data they have stolen. On top of this, the tools for a ransomware...
Blog

Spear Phishing Emails: What They Are & How to Prevent Them

Spear phishing is more focused than normal phishing. To protect against this type of phishing, your entire company will need to be educated and protected. What is a typical spear phishing attempt? A typical spear phishing attempt is a fraudulent personalized email that is usually sent with an attachment or requests a response. The fraudster then tries to entice the recipient...
Press Release

Fortra expands anti-phishing and DLP with latest acquisitions

Commenting on the Digital Guardian acquisition, Kate Bolseth, CEO,, said: “Our global customers look to us to provide them with powerful solutions and services to support all of their cybersecurity needs, and the data protection expertise the Digital Guardian team brings to Fortra is second to none. Read the full article >    ...
Blog

Email Protection: Tools for Maximum Security

If you haven’t protected your email yet, you’re open to attacks. This comprehensive guide explains what you need for complete email protection and where to get it.Email protection solutions provide features like spam filtering, firewalls, anti-phishing controls, antivirus policies, spyware detection, login security, data loss protection, and encryption to help secure your...
Blog

What Is a Phishing Attack? Types, Defenses & Prevention

  Phishing attacks are all too common and can make a company lose millions of dollars. To protect against this scam, a company must have the right protocols and software in place. What is a phishing attack? A phishing attack is a social engineering attack, where an attacker mimics a trusted company or person to steal private information such as login or financial data. These...
Blog

Is Your Enterprise Ready for the Latest LockBit Ransomware?

Ransomware is a pervasive and persistent threat. It comes in many different forms and guises and constantly evolves, making it very difficult for organizations to protect themselves. A current example of this can be found with the emergence of LockBit 3.0. LockBit 3.0 is the latest version of LockBit ransomware and has a range of new features, including Zcash payments and a...
Press Release

Fortra Acquires PhishLabs to Continue Expansion of Cybersecurity Portfolio

  Digital Risk Protection platform delivers curated threat intelligence and complete threat mitigation across digital risk landscape MINNEAPOLIS, October 19, 2021—Fortra announced today the acquisition of PhishLabs, a leading cyber threat intelligence company that protects organizations from attacks on their brands, employees, and digital assets....
Blog

How to Prevent Business Email Compromise Attacks

How can you prevent business email attacks? Is training enough? We'll walk you through solutions and tips to protect your enterprise email from these attacks. Why is business email compromise such a problem? Business email compromise (BEC) attacks are sophisticated scams that target specific individuals with believable emails asking for funds to be transferred. These attacks...
Press Release

Phishing Sustain Near- Record Levels Through the First Half of 2021

Agari by Fortra features in APWG's Q2 Phishing Activity Trends Report. Here are some highlights: APWG saw 222,127 attacks in June 2021, the third worst month in APWG’s reporting history. Financial institutions and social media sectors were the most frequently victimized. Increases in vishing and smishing continue to be observed. Vishing is phishing advertised via voice...
Blog

Ryuk, REvil, and Clop – How to Prevent Ransomware in Your Organization

Cybersecurity trends ebb and flow according to a range of factors. Yet there has been one consistent (and persistent) threat over the past few years – ransomware, the practice of demanding payment to return stolen data. Ryuk, REvil, NHS, Clop, Cezar, Pubg, Webroot, and Cryptolocker are just some examples of ransomware that have been prevalent – there are others, and there...
Press Release

How International Scam Artists Pulled Off an Epic Theft of Covid Benefits

Covid-19 provided ample opportunities for threat actors to exploit weaknesses in online systems. In this article by NBC News, spokespeople from Agari explain how one threat actor group, Scattered Canary, used email to fraudulently claim Covid relief unemployment benefits potentially worth millions of US dollars. Read the full article here. Agari’s Cyber Intelligence Division...
Blog

Why Supply Chains Are Today’s Fastest Growing Cybersecurity Threat

Business ecosystems have expanded over the years owing to the many benefits of diverse, interconnected supply chains, prompting organizations to pursue close, collaborative relationships with their suppliers. However, this has led to increased cyber threats when organizations expose their networks to their supply chain and it only takes one supplier to have cybersecurity...
Blog

Internal Breaches: The Threat That’s Too Close to Home

There were 108.9 million accounts were breached in the third quarter of 2022. This is a 70% increase compared to the second quarter. However, despite a common belief that attacks mostly involve cyber espionage or are state-sponsored, our research found that 42% of security incidents actually come from inside the organization. Since the introduction of data protection laws, such...
Press Release

Agari by Fortra Supports Customer Ready to Embrace BIMI Email Security

MINNEAPOLIS (July 15, 2021) — Agari by Fortra, a market leader in phishing defense for the enterprise, today announced that its Agari Brand Protection solution for Domain Message Authentication Reporting & Conformance (DMARC) email authentication has been enhanced to help customers take advantage of Google’s newly launched support for BIMI in Gmail. BIMI—or Brand Indicators for...
Blog

Catching Lookalike Domains with Image-Based Analysis

Reading is like riding a bicycle:  once you master it, it feels easy and automatic, and you quickly forget how much effort it took to learn. For example, we are normally not aware that we move our eyes 3 or 4 times per second as we read, glancing at each word on a screen or page for a few hundred milliseconds. Nor do we realize that only a portion of a word is visible and in...
Blog

TLS Email Encryption: What It Is & How to Check if Your Email Is Using It

What exactly is TLS when it comes to email encryption? Image TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called...