<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span style="background-color: transparent;">ThreatSTOP is excited to introduce a brand new target to our DNS Defense line up, curated with feeds from MS-ISAC, MDL, MVPS Hosts and ThreatSTOP's own security team. Currently </span><span style="background-color: transparent;">(as list is due to change and since we keep updating and changing our curated targets to </span><span style="background-color: transparent;">improve them), the new “</span><strong style="background-color: transparent;">TS Curated – Core Threats – Domains</strong><strong style="background-color: transparent;">”</strong><span style="background-color: transparent;">&nbsp;target includes these feeds:</span></p> <p>&nbsp;</p> <!--more--><br><img src="https://info.threatstop.com/hubfs/TS_CTI_TS_UNICORN.png" alt="TS_CTI_TS_UNICORN.png" style="display: block; margin-left: auto; margin-right: auto;"><br> <ul style="text-align: center;"> <li style="text-align: left;"><strong style="background-color: transparent;">ThreatSTOP Critical: </strong>Vetted by ThreatSTOP's security team, these addresses are high risk or pose an active threat. These include malware droppers, botnet C&amp;Cs, exploit kits and information on trending APT attacks.</li> </ul> <p style="text-align: center;"><strong><img src="https://info.threatstop.com/hubfs/TS_CTI_MSISAC.png" alt="TS_CTI_MSISAC.png" width="257" height="157"></strong></p> <ul style="text-align: center;"> <li style="text-align: left;"><strong>MS ISAC – Domains:&nbsp;</strong>The Multi-State Information Sharing and Analysis Center (<a href="https://www.cisecurity.org/ms-isac/">MS-ISAC</a>) is a focal point for US government cyber threat protection,&nbsp;response and recovery. MS-ISAC’s cyber security operation center provides real-time network monitoring, early cyber threat warnings and advisories,&nbsp;vulnerability identification, mitigation and incident response services. The US Department of Homeland&nbsp;Security designated MS-ISAC as its key cybersecurity resource, including Chief Information&nbsp;Security Officers, Homeland Security Advisors and Fusion Center Directors. MS-ISAC membership is open to&nbsp;all government entities.</li> </ul> <p style="text-align: center;"><img src="https://info.threatstop.com/hubfs/TS_CTI_MVPS_HOSTS_PARASITES.png" alt="TS_CTI_MVPS_HOSTS_PARASITES.png" width="257" height="157"></p> <ul style="text-align: center;"> <li style="text-align: left;"><strong>Parasites – Domains:&nbsp;</strong>This data from&nbsp;<a href="http://winhelp2002.mvps.org/">MVPS Hostfile</a>&nbsp;includes ads, banners,&nbsp;third party cookies, third party page counters,&nbsp;web bugs, hijackers and unwanted programs.</li> </ul> <p style="text-align: center;"><img src="https://info.threatstop.com/hubfs/TS_CTI_MDL.png" alt="TS_CTI_MDL.png" width="257" height="157"></p> <ul style="text-align: center;"> <li style="text-align: left;"><strong>Malware Domain List (MDL):&nbsp;</strong>This data from the <a href="http://www.malwaredomainlist.com/" target="_blank">Malware Domain List</a>&nbsp;community project includes exploit kits, trojans, coin miners, phishing and ransomware.</li> </ul> <p style="text-align: left;">You can find our new target on your policy creation screen, both in standard and expert mode. We strongly recommend adding it to your DNS Defense policy. To accommodate this change, we've also updated our own predefined policies.</p> <p style="text-align: center;">If you need assistance updating your DNS Defense policy, check out our instructions <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">here</a>&nbsp;or contact ThreatSTOP's&nbsp;.</p> <p style="text-align: center;"><span>Looking to learn more about DNS Firewalls and why they're so important? Check out our quick blog post&nbsp;</span><a href="/2016/11/28/dns-firewall-what-is-it-why-should-you-have-one">here</a><span>.&nbsp;</span>If you haven't yet, to quickly install a free 14-day ThreatSTOP trial, sign up below:</p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;"></p> <p style="text-align: center;">&nbsp;</p></span>