ThreatSTOP

Subscribe to ThreatSTOP feed
Updated: 2 min 29 sec ago

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

Sun, 04/01/2018 - 17:26

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

The High Price of Not STFU: Guccifer 2.0 Reportedly Identified

Fri, 03/23/2018 - 17:13

Photo Credit: republica

Recently, we learned that it seems authorities have identified our friend, Guccifer 2.0. The main mechanism for this is that through Guccifer 2.0’s frequent communications via Twitter and ProtonMail, on one occasion he neglected to notice he was not connected to his favorite VPN service, Elite VPN. This means authorities were able to get his actual IP address when he was communicating openly while engaging in his portion of the influence operation.

My Conversations with Guccifer 2.0 & the Surprising Election Influence Operations

Thu, 03/08/2018 - 19:22

As attention turns to threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can except coming up) There were many aspects to my research and human intelligence operation exploring what exactly was going on behind the scenes, but this article focuses on only one, Guccifer 2.0.

All Up In Your Browser: Stopping Cryptojacking Attacks

Mon, 03/05/2018 - 14:24

 

With the massive upsurge in the value of bitcoin and other cryptocurrencies, cybercriminals are turning their prime focus to cryptocurrency. One of the fastest growing forms of malware are those mining cryptocurrencies on victim machines. Specifically, using the browsers of visitors as CPU cryptocurrency miners. Even news sites are utilizing this to monetize their websites and blogs. As bitcoin often takes specialized hardware to effectively mine, criminals are turning to Monero as the mining currency of choice for victim machines.

A Don't Miss Webinar: Block & Tackle Cyberattacks Using DNS RPZ

Thu, 01/04/2018 - 18:28

Live Interactive Webinar: Blocking & Tackling Cyberthreats Using DNS RPZ

January 17th, 10 AM Pacific, 1 PM Eastern

Want to Learn More?

Request a free, 30-minute online walk-through of the ThreatSTOP Platform.

Request a Free Demo

Already in Prevention Mode?

Sign-up for a free, 14-day trial of the ThreatSTOP Platform.

Start a Free Trial

Prefer a Free Assessment?

Use any of our free assessment tools to better
understand your need for proactive defense.

Get a Real-time Assessment