<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Author Archives:threatstopbme

Recent Posts

Hard Rock Las Vegas POS Hit by Malware; Card Data Stolen

The Hard Rock Hotel & Casino Las Vegas is the latest hospitality target to announce it has been the victim of an attack. Malware on its point of sale (POS) system enabled hackers to siphon off credit card data of an undisclosed number of card holders. According to the Wall Street Journal, “the card-scraping malware identified data including cardholder name, card number, expiration date and internal verification code, in some cases.”

Read More

Share this:

Internet Pioneer Discusses Creation, Expectations and Security of DNS on its 33rd Birthday

Read More

Share this:

Infy Malware Comes Out of the Shadows

Over the last decade, the Infy malware family has been out and about and successfully operating mostly under the radar. It was first discovered in 2015 while used in attacks on an Israeli industrial target, as well as a U.S. government target. These attacks led to the detection of a whole malware campaign and infrastructure that includes over 40 variants of malware.

Read More

Share this:

CEO Fired Over $56 Million Email Scam

Long-time FACC CEO, Walter Stephan, was fired this week because the company he led – an Austrian airplane parts maker – fell victim to a CEO email scam that successfully siphoned off €52.8 million euros ($56.79 million) last January. FACC customers include Airbus, Boeing and Rolls-Royce.

Read More

Share this:

CIO: 5 security experts share their best tips for ‘fringe’ devices

ThreatSTOP's own Leon Glover was quoted in an article on CIO.com (also ran on Network World) about securing fringe devices.

Read More

Share this:

May 26: SANS "What Works" with Hillsborough Community College

John Pescatore of the SANS Institute will be interviewing ThreatSTOP customer Ken Compres of Hillsborough Community College on May 26 at 1:00 pm Eastern for a "What Works" webinar on the ThreatSTOP Shield platform.

Read More

Share this:

FBI Pays $1 million to ??? to Crack iPhone

The Washington Post reported today that the FBI paid a one-time fee of $1 million to hackers to crack the San Bernardino shooter's phone. The article goes on to say that authorities have not revealed the identity of the hackers.

Read More

Share this:

SANSFIRE 2016 -- See ThreatSTOP in Action

SANSFIRE 2016 will be here in just 51 days according to the official site. This is SANS national event in Washington DC and attracts one of the largest SANS audiences. Mark your calendars: June 11 - 18, 2016.

Read More

Share this:

Senate Floats Encryption Bill (Ack)

Just as What’s App began offering end-to-end encryption for its one billion plus users that effectively prevents anyone--including law enforcement--from reading users’ messages, members of the Senate floated the first draft of a bill aptly named "Compliance with Court Orders Act of 2016.” The bill seeks to require compliance with court orders for data.

Read More

Share this:

XTBL Ransomware aka Shade and Troldesh

XTBL Ransomware, also known as Shade and Troldesh, is a crypto-ransomware variant originally created in Russia and used in attacks all over the world. XTBL encrypts a user’s files with an “.xtbl” extension, and is mainly spread via spam e-mails.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter