<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Using Threat Intelligence for Proactive Threat Protection

With ransomware and cyber-attack chaos these days, we find ourselves focusing on the rapid appearance of new and upcoming threats. Every day is a day of new threats, new attack headlines, and new worries. But, it’s important to keep in mind that with so many new attacks come so many researchers and organizations whose goal is to collect and update as much information as possible regarding these new threats. Security service providers, researchers, and security communities collect and publish a plethora of updated, actionable threat intelligence at every given moment. The big question is – how to make all that extremely useful (yet extremely scattered) intelligence actionable, and how to automatically integrate it on to your security solutions and devices.

Read More

Share this:

Covid-19’s Lasting Impact on Cybersecurity

2020 has been quite a year. The global Covid-19 pandemic changed up the rules of most peoples’ daily lives, taking a big toll on individuals, businesses and organizations. During this time, cyber attackers were quick to jump on the exploitation wagon, taking advantage of the chaos and changes in work and activity patterns to deploy attacks, steal information and cash in on victims. Large firms such as Deloitte have seen a spike in cyber-attacks during the Coronavirus pandemic such as Covid-themed phishing, malspam, and ransomware attacks.

Read More

Share this:

RANSOMWARE NEWS JUST KEEPS ON COMING

Less than three weeks have passed since we released our ransomware-themed newsletter to our subscribers, and we’ve already come across endless new headlines about big-name ransomware attacks. And we all know - when the attacks are big, the ransom prices are high!

Read More

Share this:

Analysis: New Android Malware Steals Victim Data From 300+ Apps

 

A new android malware strain was uncovered in May, boasting the ability to steal data from 337 applications, including passwords and credit card information. Among these apps are some of the most highly-used applications on any android phone, such as Netflix, Gmail, Amazon, Uber, and more.

Read More

Share this:

Learning from the Honda Ransomware Attack

 

The Japanese manufacturing giant revealed that it had been hit with ransomware on Monday June 8, 2020, forcing it to shut down a number of manufacturing facilities and disrupting its global operations. Honda was left with no choice but to halt operations in Japan, North America, the U.K., Turkey and Italy. Furthermore, the ransomware attack caused disruptions to the company’s customer service and financial services.

Read More

Share this:

US Secret Service Warns Surge in Ransomware Attacks Targeting MSPs

 

Managed Service Providers (MSPs) seem to be a huge target for ransomware lately. MSPs in both government and the private sector have been under attack, causing the U.S. Secret Service to issue a special warning about this phenomenon.

Read More

Share this:

How to Work Towards Better Whitelisting

 

One of the key problems in threat intelligence is curating whitelists of infrastructure and domains that should never be blocked. Just recently, a government CERT distributed lists of IoCs that included private IP addresses that just are not useful for analysts and hunt teams. At best, it creates wasted time and effort. At worst, key infrastructure is blocked and there is business impact and/or loss of revenue.

Read More

Share this:

Announcing ThreatSTOP 6.0 Featuring Role Based Access Control

 

So much about good, basic Security comes down to proper access control. Information security, physical security, personal security, (probably even financial security?) – all security, it seems, works better when there’s proper control over who has access to what and when.

ThreatSTOP’s platform has historically allowed two levels of user access: Admin and Reporter. In this simple scheme, Admins could access everything, like creating a custom DNS Firewall policy, or whitelisting an IP across all their firewalls, while lowly Reporters got read-only access to look at reports. Two extremes of access control for what was a simpler time.

In the years since, things have really evolved in Security. It's gotten scarier outside – there are more threats, nastier ones, more sophisticated attackers, and shrewder methods. DDoS for hire, and turn-key ransomware. The myth of companies “too big to take down” or “too small to be targeted” got busted. It has gotten crazy out there.

Read More

Share this:

3 US Universities Hit with Ransomware in Same Week

The beginning of June saw a sudden surge in University-targeting ransomware attacks. Michigan State University, UCSF and Colombia College were all hit with ransomware from the NetWalker family within the same week. While each institution dealt with their network’s compromise differently, this “University Ransomware Week” was certainly eye-opening for higher education institutions who may need to rethink the security solutions and measures they have implemented.

Read More

Share this:

Infographic: The Most Infamous Botnets of the 21st Century

Botnets are a unique type of threat. The colossal power that networks of millions of compromised computers can reach allows botnets to do a lot of damage, from generating and stealing large sums of money to deploying dangerous attacks. Last year saw a 71.5% increase in botnets as opposed to 2018, further showing that botnets are a worthwhile business for attackers, and a prevalent threat to watch out for.

These malicious networks have been around since the very end of the 90’s, rapidly evolving and becoming more advanced, year by year. Our new infographic examines the most prevalent, well-known botnets from the beginning of the century up until today, shedding light on the diverse landscape and evolution of this fascinating threat.

Read More

Share this:

Home Page

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter