<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

ThreatSTOP Packs a Security Punch. Here's How in a Short Video. (Humor Included)

Read More

Share this:

Higher Ed. Webcast: You CAN Get Quality Cyber Protection on a Shoe-String Budget

Community colleges and universities are the ultimate Bring Your Own Device disaster. Faculty, staff and students from all over the world converge on the same network storing sensitive data, all which must be protected to comply with HIPAA, FERPA and PCI.

Read More

Share this:

Breaking News Webcast: With Indictments, John Bambenek Talks How Authorities Can Protect Democracy Against Foreign Threats

Photo Credit: Alex Wong, Getty Images

Breaking News Webcast: With Recent Indictments, John Bambenek Talks How Election Authorities Can Protect Democracy Against Foreign Threats

Read More

Share this:

John Bambenek's Talk at SANSFIRE: War Stories on Automated Threat Intelligence for Defense

 
Between limited resources, lack of trained professionals and the increasing quantity/quality of attacks, securing enterprises and responding to incidents has dealt defenders a bad hand in the digital arms race. Even managing the amounts of threat data and open-source intelligence has become a challenge.
Read More

Share this:

Don't Miss This Webcast. John Bambenek Talks Barbarians Inside the Gates: Trends in Attackers Bypassing Your Security Tools.

 

Barbarians Inside the Gates: Hacking Trends You Don't Know That Are Bypassing Your Security

Read More

Share this:

Webinar: Embrace the Suck. How to Protect IoT Devices You Can't Change.

Read More

Share this:

ThreatSTOp Incorporates New Tor Proxies Target

 

We are happy to announce a new ThreatSTOP originated target, TS Originated - Tor Proxies - Domains, which provides protection from various malware and ransomware variants which utilize Tor proxy services to attack victims.

Abuse of Tor proxy services for malicious use has been on the rise in the past two years, with many ransomware variants demanding ransom payments over the Tor network. The Tor network, which gives its users anonymity, is a great platform for threat actors to deploy their malicious activity while hiding from discovery.

Read More

Share this:

ORANGEWORM ATTACK GROUP TARGETS HEALTHCARE SECTOR WITH WORM-LIKE TROJAN

 

Read More

Share this:

THREATSTOP ADDS DATAPLANE TARGETS FOR INBOUND ATTACK AND SCANNING PROTECTION

We are happy to announce the addition of DataPlane, a new source for inbound attacks and scanning. 

 

Read More

Share this:

ThreatSTOP Introduces New Targets From Bambenek Consulting Feeds

Several new malware families have made recent appearances on the Bambenek Consulting feeds and are now tracked also by ThreatSTOP. These malware families are different in action and in their targets.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter