Feed aggregator

Mo EK Domains, Mo Security Mo Better

ThreatSTOP - Tue, 05/23/2017 - 14:11

Our Security team, working diligently to keep your data safe, has added more Exploit Kit (EK) sources to our Driveby Domains target. We are happy to announce the addition of domains from the BlackHole Exploit Kit.

ThreatSTOP Tools & Action For Visibility Fighting Ransomware & WannaCry

ThreatSTOP - Wed, 05/17/2017 - 23:36

Protecting and empowering our valued customers is always a top priority at ThreatSTOP. Today, we're taking additional action to deliver better protection and greater visibility related to the WannaCry ransomware attack.

Operation Cloud Hopper Jumps Into View

ThreatSTOP - Wed, 05/17/2017 - 18:08

Operation Cloud Hopper, uncovered by researchers at BAE Systems and PwC, was a cyberespionage campaign by APT10 (also known as Red Apollo and the menuPass Team) that targeted IT managed service providers (MSPs) in order to steal their clients' corporate data.

This Past Weekend Made All of Us WannaCry

ThreatSTOP - Sun, 05/14/2017 - 14:38

On May 12th, an outburst of a new Ransomware named WannaCry (aka WannaCrypt, WCry) took place. This ransomware, spread wildly in a short amount of time, infected over 100K victims in over 99 countries utilizing the MS17-010 Vulnerability. The following image from the live infection map, demonstrating how big the impact of this campaign had been over the past 24 hours.

Bi-Weekly Security Update 5/11/17

ThreatSTOP - Thu, 05/11/2017 - 19:39

Malicious Content Identified and Inserted:

ThreatSTOP & Reposify Partner to Stop DDoS Attacks from Infected IoT Devices & Services

ThreatSTOP - Tue, 05/09/2017 - 18:54
Cyber Security Startups Combine Threat Data & Real-Time Policy Delivery Platform to Address Huge Gap in Cybersecurity.

Knock-Knock! Who’s There? ... NoTrove.

ThreatSTOP - Tue, 05/09/2017 - 17:34

 

Internet-based advertising has been in wide use since the early 21st century. Its popularity grew in 2010 with the development of programmatic advertising. (Also referred to as automated advertainment) Here, you pay per ad view, which can be maliciously misused by counting machines and bots as actual viewers. Additional types of malicious use include accumulating web traffic and selling it to web traffic brokers, or engaging this traffic in semi-malicious programs like PUP. (Potentially Unwanted Programs)

Targets for Inbound Attacks & Whitelisting Major Services in Policies

ThreatSTOP - Tue, 05/09/2017 - 14:54

We are happy to announce the release of a new Blacklist target for our IP Firewall service.

Use of VPN and Tor Traffic Allows Corporate Security Bypassing

ThreatSTOP - Mon, 05/08/2017 - 23:47

 

We’ve all been bored at work, that’s a given. We don’t have a need to go crashing through the brush looking for our next meal and that leaves our brains with a bunch of extra cycles to spend on life in the modern world. That means our personal lives, our jobs, and what to have for lunch.

New DGA Targets for DNS Firewall Policy

ThreatSTOP - Thu, 05/04/2017 - 13:20

ThreatSTOP’s Security Research Team has been busily tracking down new threat sources and compiling publicly shared data from multiple research teams. The result is our New Domain Generation Algorithm (DGA) target collection.

Pages

Want to Learn More?

Request a free, 30-minute online walk-through of the ThreatSTOP Platform.

Request a Free Demo

Already in Prevention Mode?

Sign-up for a free, 14-day trial of the ThreatSTOP Platform.

Start a Free Trial

Prefer a Free Assessment?

Use any of our free assessment tools to better
understand your need for proactive defense.

Get a Real-time Assessment