<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Author Archives:Dror Av.

Recent Posts

ThreatSTOP Incorporates Google, YouTube & Bing Safe Search as New Content Filtering Policies

We are happy to announce that we have incorporated Google, YouTube and Bing Safe Search option simply by adding the new targets to your policy. Safe Search is a feature that acts as an automated filter of pornography and potentially offensive content. It is possible to enforce safe search filters by modifying DNS queries so, for instance, safe search will be always on for YouTube. Using that Safe Search is now available via the ThreatSTOP platform. To enable it on your DNS all you have to do is add the relevant list to your policy and the DNS Defense Will automatically do the rest for you. The new targets available to add are:

Read More

Share this:

All Up In Your Browser: Stopping Cryptojacking Attacks

With the massive upsurge in the value of bitcoin and other cryptocurrencies, cybercriminals are turning their prime focus to cryptocurrency. One of the fastest growing forms of malware are those mining cryptocurrencies on victim machines. Specifically, using the browsers of visitors as CPU cryptocurrency miners. Even news sites are utilizing this to monetize their websites and blogs. As bitcoin often takes specialized hardware to effectively mine, criminals are turning to Monero as the mining currency of choice for victim machines.

Read More

Share this:

New Drive-by Targets

Read More

Share this:

Enhancing Protection Against Tor

In the past week, we decided to enhance the protection we offer via our Anonymous Networks target, and discussed the use of VPN and Tor to bypass network security. Up until today, we primarily only blocked Tor exit nodes. However, we decided that this target should not only block Exit nodes, but also Guard and Middle relays. Here, we explain how TOR works and what changes were made to the target.

Read More

Share this:

Mo EK Domains, Mo Security Mo Better

Our Security team, working diligently to keep your data safe, has added more Exploit Kit (EK) sources to our Driveby Domains target. We are happy to announce the addition of domains from the BlackHole Exploit Kit.

Read More

Share this:

New Targets to Protect Against Incoming Attacks

We are happy to announce the release of 3 new targets, including updates to 3 existing ones. The new IPs derive from live attacks targeting online servers. This data is collected by the voluntary service, blocklist.de.

Read More

Share this:

3 New Targets Protecting Against Drive-By Attacks

We are happy to announce the release of 3 new targets, specifically protecting against Drive-By attacks. In a drive-by attack, web sites are used as malware droppers. The targets include manually identified domains, as well as domains identified by running known botnet domain generation algorithms. These 3 new targets are built for users to choose the level of protection that accommodates their needs.


The 3 new targets are:

Read More

Share this:

DGA Updates

wood-cube-473703_1280.jpg

In December, we introduced a target list of more than 20 malware family DGAs provided by our friends over at 360 Research Team. Continuing their great work, we are happy to integrate 7 new malware DGAs:

Read More

Share this:

DGAs For the Masses

At ThreatSTOP, we strive to provide our customers with the most up-to-date and accurate protection from both known and emerging threats. Using the data provided by our friends at the Qihoo 360 research team we have constructed a target list of over 20 identified malware families. The malware families that we will be protecting you against are:

Read More

Share this:

Sweeten Your Security with Honey

 

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter