Resources

Blog

Executive Attacks on Social Media Hit All-Time High as Analysts Point to AI

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

Cybercriminal Focus in the New Year – Top 2024 Threat Trends

Criminals are constantly innovating ways to enhance deliverability and increase the success of their campaigns. Email phishing remains one of the most significant threats to organizations, but a growing number of campaigns are first touching victims via non-traditional lures or through engagement on platforms where users are more susceptible to scams. Understanding how online threats are evolving...
Blog

Getting the Board on Board: Explaining Cybersecurity ROI

In this Tripwire guest blog, we break down how to best communicate the significance of a cybersecurity investment. Despite increasing data breaches, ransomware attacks, and assorted cyber threats, convincing the Board of Directors to invest in robust cybersecurity isn't always easy for many businesses. The challenge originates mainly from the need to demonstrate a quantifiable Return On Investment...
press_release

CNET: Scam website are using that green https padlock to fool you

A PhishLabs report by security writer Brian Krebs was featured in a CNET article warning web users about HTTPS security fraud on the Internet. Originally published in CNET . You may have heard you should look for the padlock symbol at the top of a website before entering your password or credit card information into an online form. It's well-meaning advice, but new data shows it isn't enough to...
press_release

InfoSec Magazine: How the FBI Caught Voice Phishing (Vishing) Scammers

Founder and CTO of PhishLabs John LaCour spoke with FBI Special Agent Davey Ware at the RSA Conference in San Francisco to talk about how vishing attacks work to defraud victims of their money and discuss how one group of vishing criminals was caught. Originally published on Infosecurity Magazine . "Vishing attacks are phishing attacks that use the telephone network," LaCour said. He explained...
Quote

Fortra’s PhishLabs is the leading provider of threat intelligence and mitigation solutions. Our Digital Risk Protection platform safeguards your organization’s critical digital assets through expert-curated threat intelligence and complete mitigation, protecting your enterprise, brands, and customers from digital threats. Complete the form to request a quote from our sales team to learn more about...
Resource

Request Support

Need help? Complete the form to request support from our team. If you have an emergency and need assistance, we will respond to your request within 1 hour. Client support is also available 24/7 via the PhishLabs Web Application or API integration. SOC: +1.877.227.0790 or +1.202.386.6001 For all other inquiries, please submit a Contact Request .
Guide

2023 Domain Impersonation Report

Current Domain Threats, Trends, and Techniques Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal. In the 2023 Domain Impersonation Report, we review look-alike domain...
Guide

Disrupt Counterfeit Threats

A Digital Risk Protection Playbook Counterfeit threats, such as fraudulent ads and look-alike domains, are on the rise especially with the expansion of e-commerce and online consumer-to-business interaction. However, the collection and mitigation of counterfeit activity can be complicated. Prioritizing relationships with platforms and providers along with collecting data showing evidence of abuse...
Video

On-Demand Webinar: Handling Threats That Land in User Inboxes

The risk of a user receiving a socially engineered attack is higher than ever, and technological solutions often miss the most devastating of them. Though technology is both an important and required component in protecting the enterprise, security teams need to remain vigilant and educated on quickly identifying threats which make it past technology. This includes the latest social engineering...
Video

Digital Risk Protection: Evolving Your Cyber Threat Intel Program Into Action

Now Available On-demand Digital Risk Protection is an emerging technology that is on the rise in Gartner’s latest Hype Cycle for Security Operations. In this webinar, PhishLabs’ Manager of Solutions Engineering, Eric George, will break down Digital Risk Protection, explain how it works, and share recent use cases. You will learn how enterprises use Digital Risk Protection to proactively detect and...
Video

Digital Risk Protection: Evolving Your Cyber Threat Intel Program Into Action HISAC

Digital Risk Protection is an emerging technology that is on the rise in Gartner’s latest Hype Cycle for Security Operations. In this H-ISAC Navigator Program Webinar, PhishLabs’ Founder and CTO, John LaCour, will break down Digital Risk Protection, explain how it works, and share recent use cases. You will learn how the Healthcare industry is using Digital Risk Protection to proactively detect...
Video

Data Leaks Don't Discriminate

Unique conditions driven by the pandemic in the first half of 2020 have increased companies’ exposure to online threats and the likelihood of experiencing a data leak incident. If that weren’t enough, an emerging trend in ransomware attacks reveals that cybercriminals are now threatening to leak compromised data if ransom demands aren’t met. In this webinar, PhishLabs’ Director of Product...
Video

Domain Protection Best Practices Webinar

Domains are the cornerstone of an organization’s digital presence and IT infrastructure, which means domains are also lucrative to cybercriminals who use domain impersonation to create fake email addresses and websites for personal gain. Organizations cannot afford to keep domain protection out of their overall cybersecurity strategy. Watch Eric George, Director of Solutions Engineering at Fortra...
Video

Key Insights from the 2023 Cyberthreat Defense Report

Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge The 2023 Cyberthreat Defense Report provides deep insight into the perspectives of cybersecurity professionals. Join us to learn what your peers are thinking and doing Thursday, May 4, at 11 a.m. ET. Eric George, Director of Solutions Engineering at Fortra, and Steve Piper, CEO of CyberEdge, will present an...
Video

COVID-19 Cyber Threat Intelligence

How threat actors are abusing the global pandemic The novel coronavirus (COVID-19) is giving opportunistic threat actors new methods to deploy malicious lures on unsuspecting targets. As the pandemic spreads, industries of all shapes and sizes are finding themselves targeted by cyber attacks leveraging the fear and uncertainty associated with the virus. Access the recording of this web event to...
Video

Emerging Threats: Disrupt Counterfeit Activity Targeting Retail Brands

Eric George, Director of Solution Engineering at PhishLabs As retail brands expand their online presence to selling goods and engaging with consumers, threat actors are leveraging the credibility of reputable organizations to profit off of cannibalized sales. Counterfeit storefronts mimic legitimate brands using look-alike domains, copyrighted content, and stolen intellectual property. Threat...
Guide

Brand Threats Masterclass

In 2024, organizations face growing brand protection challenges with online impersonation attacks targeting their assets through non-traditional means. These attacks are spanning channels not typically protected by corporate controls and leveraging AI to generate lures, making detection increasingly broad and mitigation nuanced. To better understand the top brand risks, Fortra held a roundtable...
Blog

VM Blog: Braving the Digital Risk & Email Security Landscape

How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry’s future and shares his seven predictions for 2024. Originally published in VM Blog . Excerpt: “AI and ML will enhance capabilities on both sides of the cyber landscape – for good and bad. On the defensive side, those protecting the targets will use advanced data...
Guide

Ransomware Playbook: Defense in Depth Strategies to Minimize Impact

Ransomware operators are disabling critical systems and publishing stolen data in record volumes, and businesses that fall prey to an attack often feel helpless determining a solution because the threat itself is in a constant state of evolution. This playbook breaks down how to: Identify and mitigate attacks before they occur Maintain broad visibility into data leaks and threat actor activity...