<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

How Malvertising Leads to Fake Flash Malware

It’s no secret that the pervasiveness of ad networks has greatly diminished the web browsing experience in recent years. With this has also come criminals and other miscreants who are using the drive for web advertising revenue to deliver malware.

Read More

Share this:

Why You Need to Block the Threat Factory. Not Just the Threats.

 

Cyber criminals will create roughly 100 million new malware variants over the next 12 months. Security vendors will respond with new malware signatures and behaviors to stop them, but thousands of companies will be victimized in the process, experiencing costly or catastrophic breaches. This isn’t new - it’s a cycle.

Read More

Share this:

Axim & ThreatSTOP Live Webcast: January 24. John Bambenek Talks Reducing Your Attack Surface with Threat Intelligence

Gathering and implementing threat intelligence is overwhelming, but it can be done in an extremely effective and uncomplicated way. John Bambenek, ThreatSTOP's VP of Security and Research, will talk about the threat landscape's new reality, where attackers are financially motivated pros, visibility into threats is limited and the attack surface has grown exponentially. (There have been 96M malware variants since 2016) With this, utilizing threat intelligence the right way (combined with modern packet capture) is essential to IT security and compliance.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter