<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

How to Keep Online Holiday Shopping Safe. Plus, Identifiable Warning Signs of Malicious Ukrainian JavaScript.

As we’re approaching the holiday season, so many are heavily relying on the internet for their shopping. With fewer than 50 online shopping days until Christmas, pressure to bargain hunt is skyrocketing, with retailers gearing up to make tempting offers on those dream items. However, it's not just the online retailers gearing up to take your money, the online criminals are, too.

Read More

Share this:

Need Affordable Cisco Umbrella Alternatives? This Chart Is Clutch.

Whether you're a company looking for an affordable alternative to Cisco Umbrella Enterprise's high cost, or looking for a solution with more features, better support & granular reporting, here's a breakdown of how ThreatSTOP and Cisco line up.

Read More

Share this:

Attackers Are Targeting Healthcare: Here's 4 Things You Need to Do Now

In the third quarter of 2018 alone, 4.4 million patient records were compromised across 117 disclosed health data breaches. This shows that health care continues to be targeted by criminals. The largest breach was UnityPoint, with 1.4 million records compromised.

Read More

Share this:

Universities Beware: Attackers Are Getting Savvy with Fake Cyber Security Courses

Is your university protected? Iranian hackers attempted to attack U.K. universities with fake, government-certified cyber security courses. They accessed at least one college account.

Read More

Share this:

These Factors MUST Work For Every Successful Ransomware Attack. DNS is Always Involved.

A government agency that found itself infected with ransomware and having to pay the ransom to restore service. Another local agency has opted not to pay the ransom and restore operations. Ransomware targeted at organizations is still a threat and even with backups, you have a highly disruptive and public event to try to get back online that comes with serious costs and potentially lost revenue.

Read More

Share this:

GreyEnergy Discovered As Successor to Notorious BlackEnergy

Read More

Share this:

ThreatSTOP & The Libssh Vulnerability: What You Need To Know

This week, the libssh project announced a serious bug in versions of their library released in the last few years.

Read More

Share this:

Torii: The New IoT Botnet You Might Need to Start Worrying About

An extremely sophisticated IoT botnet has recently been discovered and dubbed “Torii.” One of Torii malware’s many advanced capabilities is running on just about every type of smartphone, computer and tablet, with over 100 malware variants supporting over 15 different architectures.

Read More

Share this:

Bite Size Security News: Now Is The Time For Zero Trust Security

Zero Trust Networking is that all network communication should be considered untrusted unless otherwise designated as safe (i.e. with authentication, a known source, or other criteria).

Read More

Share this:

Bite Size Security News: Apple Denies Cybersecurity Breach to Congress

Summary

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter