Resources

Guide

Machine Learning Models in Cloud Email Protection

Traditional email security products struggle to detect email impersonation threats such as Business Email Compromise (BEC) and spear phishing campaigns. These threats consistently bypass defenses that rely on signatures and policies like Secure Email Gateways and native-cloud email filters. This guide breaks down how Fortra uses advanced data science, including machine learning models, to find and mitigate attacks that slip past traditional email defenses.
Guide

Scattered Canary Threat Dossier

Business email compromise (BEC) has continued to grow into a billion-dollar industry as cybercriminals turn to it as their preferred scam. But with the West African gang we’ve named Scattered Canary, we have deeper insight into how BEC is connected to the rest of cybercrime, and why it has grown in recent years.Download the threat dossier to learn:How Scattered Canary grew from a one-man startup...
On-Demand Webinar

QR Codes That Aren't Cool Webinar

Threat adversaries have pivoted their credential phishing and BEC tactics in order to bypass security stacks. In this video, Fortra’s Advanced Email Security expert, Dr. Steve Jeffery, discusses how the QR code has become the carrier of choice for delivering payloads via email and what your organization needs to put in place to stop them.You’ll learn:How human and machine mitigations help ward...
Guide

Getting Started with DMARC

The reality of email is that cybercriminals can use almost any brand or email domain to send spam, phishing emails, and malware installs, inflicting direct losses to customers and eroding the brand equity companies have spent years building up. The solution is DMARC, which allows companies to understand all the different mail streams being sent under their name, and prevent the malicious ones from...
Guide

Anatomy of a Compromised Account

Credential phishing leads to compromised accounts, and compromised accounts lead to more credential phishing.In order to uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts, includingHow 50% of...
Guide

Threat Intelligence Brief: The Geography of BEC

Business Email Compromise (BEC) is a worldwide scourge affecting more than three-fourths of the world’s economies. Around the globe, BEC cybercriminals operate with impunity to steal $26 billion each year.The Agari Cyber Intelligence Division conducted nearly 10,000 active engagements with BEC threat actors and captured the scope of BEC’s global footprint and trends. In this report, you’ll...
Guide

Scarlet Widow Part 2: BEC Bitcoin Laundry—Scam, Rinse, Repeat

While many cybercriminal gangs scam medium-sized and large corporations, Agari has now uncovered and documented the practices of a Nigeria-based scammer group, dubbed Scarlet Widow, that has evolved a different strategy focused on more vulnerable sectors such as school districts, universities, and nonprofits. In this report, we uncover:How Scarlet...
Guide

Enhancing Microsoft's Security with Fortra Email Security

Traditional Secure Email Gateways and M365 security offer some protection, however they can't ward off the entire spectrum of advanced threats–from the staging of email-borne attacks outside your organization to active threats landing in the inbox.Download this guide to learn:The most common threats to email securityMicrosoft 365 email security shortcomingsHow to extend Microsoft 365 security with...
Guide

Download the 2022 Email Fraud & Identity Deception Trends Report

In 2021 alone, the FBI's IC3 report published that over $44 million in losses were a direct result of effective phishing and advanced email scams. The Agari Cyber Intelligence Division analyzed trillions of emails and nearly 500 million Internet domains to uncover the scope and impact of this email fraud… and the trends that benchmark enterprise security teams’ ability to respond to email threats....
Blog

The State of Email Trust: Global DMARC Adoption Trends in Q2 2025

Fortra analysis of DNS and email authentication settings across the top 10 million domains reveals both progress and persistent issues in email security. Adoption of protocols like SPF and DMARC has grown, but widespread misconfigurations and underuse continue to leave most domains exposed to spoofing, phishing, and business email compromise.
Blog

Think Your Encrypted Email Is Secure? It Might Be. . . Or Not!

When sending out an email, a lot can go wrong. To get around that, many people encrypt. And that’s a great solution. But a lot can go wrong with that, too.Is the answer to this to start delivering all your messages by hand or pigeon carrier? No. But it certainly involves having a multi-dimensional view of what it is to send a fully secure email and an understanding of the ways in which we can mess...
Blog

Cloudflare’s pages.dev and workers.dev Domains Increasingly Abused for Phishing

Fortra has observed a rising trend in legitimate service abuse, with a significant volume of attacks targeting Cloudflare Pages. Workers.dev is a domain used by Cloudflare Workers’ deployment services, while Pages.dev is used by Cloudflare’s Pages platform that facilitates the development of web pages and sites. Fortra’s Suspicious Email Analysis (SEA) team has identified different threats being...
Blog

Zero-Day Threats: How Cloud Email Security Can Mitigate Risks

By Q3 2024, organizations encountered credential theft in nearly 50% of all email security threats they handled, while malware grew by 4% which is the highest amount of volume since Q1. Learn how cloud-based solutions can help detect and prevent zero-day attacks like malware and more.