Feed aggregator

ThreatSTOp Incorporates New Tor Proxies Target

ThreatSTOP - Thu, 05/31/2018 - 22:00


We are happy to announce a new ThreatSTOP originated target, TS Originated - Tor Proxies - Domains, which provides protection from various malware and ransomware variants which utilize Tor proxy services to attack victims.

Abuse of Tor proxy services for malicious use has been on the rise in the past two years, with many ransomware variants demanding ransom payments over the Tor network. The Tor network, which gives its users anonymity, is a great platform for threat actors to deploy their malicious activity while hiding from discovery.


ThreatSTOP - Tue, 05/22/2018 - 22:02

We are happy to announce the addition of DataPlane, a new source for inbound attacks and scanning. 


ThreatStop Introduces New Targets From Bambenek Consulting Feeds

ThreatSTOP - Tue, 04/24/2018 - 18:57

Several new malware families have made recent appearances on the Bambenek Consulting feeds and are now tracked also by us ThreatSTOP. These malware families are different in action and in their targets.

New Target Against Drive-By attacks- Nao Sec

ThreatSTOP - Tue, 04/24/2018 - 18:56

nao_sec is a cyber security research dedicated to research on Exploit Kits. In campaigns that include Exploit kit, there is use of landing pages that include a malicious code with an attempt to exploit a specific vulnerability on the victim's device.

ThreatSTOP Incorporates Google, YouTube & Bing Safe Search as New Content Filtering Policies

ThreatSTOP - Tue, 04/24/2018 - 16:30

We are happy to announce that we have incorporated Google, YouTube and Bing Safe Search option simply by adding the new targets to your policy. Safe Search is a feature that acts as an automated filter of pornography and potentially offensive content. It is possible to enforce safe search filters by modifying DNS queries so, for instance, safe search will be always on for YouTube. Using that Safe Search is now available via the ThreatSTOP platform. To enable it on your DNS all you have to do is add the relevant list to your policy and the DNS Defense Will automatically do the rest for you. The new targets available to add are:

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

ThreatSTOP - Sun, 04/01/2018 - 17:26

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

The High Price of Not STFU: Guccifer 2.0 Reportedly Identified

ThreatSTOP - Fri, 03/23/2018 - 17:13

Photo Credit: republica

Recently, we learned that it seems authorities have identified our friend, Guccifer 2.0. The main mechanism for this is that through Guccifer 2.0’s frequent communications via Twitter and ProtonMail, on one occasion he neglected to notice he was not connected to his favorite VPN service, Elite VPN. This means authorities were able to get his actual IP address when he was communicating openly while engaging in his portion of the influence operation.

My Conversations with Guccifer 2.0 & the Surprising Election Influence Operations

ThreatSTOP - Thu, 03/08/2018 - 19:22

As attention turns to threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can except coming up) There were many aspects to my research and human intelligence operation exploring what exactly was going on behind the scenes, but this article focuses on only one, Guccifer 2.0.

All Up In Your Browser: Stopping Cryptojacking Attacks

ThreatSTOP - Mon, 03/05/2018 - 14:24


With the massive upsurge in the value of bitcoin and other cryptocurrencies, cybercriminals are turning their prime focus to cryptocurrency. One of the fastest growing forms of malware are those mining cryptocurrencies on victim machines. Specifically, using the browsers of visitors as CPU cryptocurrency miners. Even news sites are utilizing this to monetize their websites and blogs. As bitcoin often takes specialized hardware to effectively mine, criminals are turning to Monero as the mining currency of choice for victim machines.

Want to Learn More?

Request a free, 30-minute online walk-through of the ThreatSTOP Platform.

Request a Free Demo

Already in Prevention Mode?

Sign-up for a free, 14-day trial of the ThreatSTOP Platform.

Start a Free Trial

Prefer a Free Assessment?

Use any of our free assessment tools to better
understand your need for proactive defense.

Get a Real-time Assessment