<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

Read More

Share this:

The High Price of Not STFU: Guccifer 2.0 Reportedly Identified

Photo Credit: republica

Recently, we learned that it seems authorities have identified our friend, Guccifer 2.0. The main mechanism for this is that through Guccifer 2.0’s frequent communications via Twitter and ProtonMail, on one occasion he neglected to notice he was not connected to his favorite VPN service, Elite VPN. This means authorities were able to get his actual IP address when he was communicating openly while engaging in his portion of the influence operation.

Read More

Share this:

My Conversations with Guccifer 2.0 & the Surprising Election Influence Operations

As attention turns to the cyber threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can presumably except coming up) There were multiple aspects to my research and human intelligence operations exploring what was going on behind the scenes in 2016, but this article focuses on only one, Guccifer 2.0.

Read More

Share this:

All Up In Your Browser: Stopping Cryptojacking Attacks

With the massive upsurge in the value of bitcoin and other cryptocurrencies, cybercriminals are turning their prime focus to cryptocurrency. One of the fastest growing forms of malware are those mining cryptocurrencies on victim machines. Specifically, using the browsers of visitors as CPU cryptocurrency miners. Even news sites are utilizing this to monetize their websites and blogs. As bitcoin often takes specialized hardware to effectively mine, criminals are turning to Monero as the mining currency of choice for victim machines.

Read More

Share this:

A Don't Miss Webinar: Block & Tackle Cyberattacks Using DNS RPZ

Live Interactive Webinar: Blocking & Tackling Cyberthreats Using DNS RPZ

January 17th, 10 AM Pacific, 1 PM Eastern

Read More

Share this:

ThreatSTOP Adds Support for DShield Collaborative 404 Error Page Reporting

DShield has a project called the 404Project. The goal of the project is to track attackers looking to compromise web pages.

To do this, they've started selling a Raspberry Pi Honeypot to hook into your network. The alternative, is to embed one of a selection of code snippets into your website's 404 error page. These honey pots track hits on the 404 page. Hackers generate these hits when scanning for vulnerable utilities common to various web hosts. When the 404Project detects these scans, it records the attacker's IP and uploads it to DShield.

Read More

Share this:

Get the Industry's #1 DNS Firewall, Starting at $5,995

Cyber security shouldn’t cost you an arm and a leg, and we believe that every business should have the option to get high quality, affordable protection. 95% of malware attacks involve DNS, and you shouldn’t ever have to compromise your organization, career, or peace of mind -- Hackers are waiting for just that. 

Read More

Share this:

Exactly Why You Need to Secure Your DNS

Securing DNS is more important than ever before, and now more affordable than ever. DNS is used in more than 95% of today’s malware attacks, and it only takes an hour to add ThreatSTOP’s DNS Defense to protect yours.

Read More

Share this:

ThreatSTOP Introduces "Ts Curated - Basic Threats - Domains" - New Target for DNS Defense

ThreatSTOP is excited to introduce a brand new target to our DNS Defense line up, curated with feeds from MS-ISAC, MDL, MVPS Hosts and ThreatSTOP's own security team. Currently (as list is due to change and since we keep updating and changing our curated targets to improve them), the new “TS Curated – Core Threats – Domains target includes these feeds:

 

Read More

Share this:

Cyber Monday! Shop Secure with Free Roaming Defense in December

 

Read More

Share this: