{
	"id": "3928e151-8478-484e-ba17-78521d0b1181",
	"created_at": "2026-04-26T02:18:56.128722Z",
	"updated_at": "2026-04-26T02:20:25.010469Z",
	"deleted_at": null,
	"sha1_hash": "a01d347b3048d56391e5210a46e1f308a7d38db9",
	"title": "Getting to Know Ian Thornton-Trump: “There Is No Such Thing as Unprecedented”",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 54953,
	"plain_text": "Getting to Know Ian Thornton-Trump: “There Is No Such Thing\r\nas Unprecedented”\r\nBy Dan Raywood\r\nPublished: 2026-04-24 · Archived: 2026-04-26 02:10:44 UTC\r\nBlog\r\nSometimes Changing the Password on Your Email Mailbox Isn't Enough\r\nHave you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your\r\ntime. Because newly released research reveals that hackers may already have beaten you to it.A new report from\r\nresearchers at Proofpoint reveals that approximately one in ten Microsoft 365 accounts compromised in Q4 2025\r\nhad malicious mailbox rules created shortly after the attacker...\r\nBlog\r\nApril 2026 Patch Tuesday Analysis\r\nToday’s Patch Tuesday Alert addresses Microsoft’s April 2026 Security Updates. The FIRE team is actively\r\nworking on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.\r\nBlog\r\nFortra Patch Priority Index for March 2026\r\nGet the latest Patch Priority Index from Fortra which highlights critical Microsoft and Google vulnerabilities,\r\ncovering Edge, Office, Windows, .NET, and key server components.\r\nBlog\r\nAI and Cryptocurrency Scams are Costing Americans Billions, FBI Reports\r\nThe FBI's Internet Crime Complaint Center (IC3) has released its 2025 Annual Report, and two threats dominate\r\nthe headlines: artificial intelligence and cryptocurrency. Together, crypto and AI is reshaping the fraud landscape\r\nin ways that should concern organizations and individuals alike.According to its report, for the first time in the\r\nIC3's 25-year history, complaints of cybercrime crossed the...\r\nBlog\r\nFortra Discovers Datto Living Off the Land Binary\r\nFortra researchers identified an active phishing campaign that delivers a Remote Access Trojan by abusing Datto’s\r\nlegitimate RMM platform as its command-and-control channel, giving attackers persistent, full remote access\r\nhttps://digitalguardian.com/blog/iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites\r\nPage 1 of 3\n\nwhile blending into normal enterprise traffic. The campaign relies on social engineering rather than exploits and is\r\ndifficult to detect because malicious activity is tunneled through trusted Datto RMM infrastructure over HTTPS.\r\nBlog\r\nBEC Global Insights Report: March 2026\r\nMarch 2026 BEC threat intelligence from Fortra shows a 53% drop in attack volume, top cash‑out methods, gift\r\ncard trends, crypto scams, and average wire fraud amounts.\r\nBlog\r\nManage Your Mismatched SOCs\r\nDeciding whether to build an in-house security operations center (SOC) or outsource Security Operations\r\n(SecOps) in whole or in part is one of the most important decisions a security leader makes. The question might\r\nseem as simple as internal or external, but there are a huge number of factors at play. As a SOC leader, you must\r\nmake sure the model you choose matches your organization. That means...\r\nBlog\r\nInside RSAC 2026: Key Takeaways from the Fortra Team\r\nWith more than 40,000 attendees converging from around the world, the cybersecurity debates and ideas were\r\nconstant at RSAC 2026. Here’s what stood out to some of Fortra’s team members who were at the event.\r\nBlog\r\nData Security for AI Explained\r\nWhat Is AI Fools? AI Fools Week (also referred to as AI Fools: Stay Sharp!) is an annual cybersecurity awareness\r\ncampaign created by the National Cybersecurity Alliance. Inspired by the spirit of April Fool’s Day, the campaign\r\nhighlights how AI-powered pranks and deceptions can go beyond harmless jokes. AI Fools Week’s goal is to\r\neducate individuals and organizations on how to spot and avoid AI...\r\nBlog\r\nWorld Leaks Data Extortion: What You Need to Know\r\nWhat Is World Leaks?World Leaks is a cyber extortion operation that steals sensitive data from organizations and\r\nthreatens to leak it via the dark web if a ransom is not paid.Hang on - Isn't That Just Ransomware by Another\r\nName?Well, you can think of it like that if you want - but traditional ransomware attacks involve two things:\r\nstealing and encrypting your data, followed by demands for payments...\r\nBlog\r\nStopping Zero-Day Threats with Cloud Email Security\r\nhttps://digitalguardian.com/blog/iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites\r\nPage 2 of 3\n\nWhat Is a Zero-Day Threat? A zero-day attack leverages a previously unknown vulnerability — one that hasn’t\r\nbeen detected by developers or security experts. Because the vulnerability is unknown, there is typically no\r\nexisting patch or fix, leaving systems temporarily vulnerable until a solution can be developed and deployed. The\r\nterm \"zero-day\" refers to the fact that defenders have \"zero days\" of...\r\nBlog\r\nThe Dark Web Demystified: 6 Things You Should Know\r\nDemystify the Dark Web: Learn the difference between the Deep Web and Dark Web, uncover legitimate uses, and\r\nexplore key risks like doxing, ransomware-as-a-service, and brand impersonation that could impact your business.\r\nBlog\r\nLeakNet Ransomware: What You Need to Know\r\nLeakNet is a ransomware operation that has been active since late 2024, encrypting, exfiltrating, and - if a ransom\r\nis not paid - leaking the data of compromised organisations.\r\nSource: https://digitalguardian.com/blog/iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites\r\nhttps://digitalguardian.com/blog/iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://digitalguardian.com/blog/iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites"
	],
	"report_names": [
		"iceid-banking-trojan-targeting-banks-payment-card-providers-e-commerce-sites"
	],
	"threat_actors": [],
	"ts_created_at": 1777169936,
	"ts_updated_at": 1777170025,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a01d347b3048d56391e5210a46e1f308a7d38db9.pdf",
		"text": "https://archive.orkl.eu/a01d347b3048d56391e5210a46e1f308a7d38db9.txt",
		"img": "https://archive.orkl.eu/a01d347b3048d56391e5210a46e1f308a7d38db9.jpg"
	}
}