ThreatSTOP is excited to introduce a brand new target to our DNS Defense line up, curated with feeds from MS-ISAC, MDL, MVPS Hosts and ThreatSTOP's own security team. Currently (as list is due to change and since we keep updating and changing our curated targets to improve them), the new “TS Curated – Core Threats – Domains” target includes these feeds:
- ThreatSTOP Critical: Vetted by ThreatSTOP's security team, these addresses are high risk or pose an active threat. These include malware droppers, botnet C&Cs, exploit kits and information on trending APT attacks.
- MS ISAC – Domains: The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a focal point for US government cyber threat protection, response and recovery. MS-ISAC’s cyber security operation center provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification, mitigation and incident response services. The US Department of Homeland Security designated MS-ISAC as its key cybersecurity resource, including Chief Information Security Officers, Homeland Security Advisors and Fusion Center Directors. MS-ISAC membership is open to all government entities.
- Parasites – Domains: This data from MVPS Hostfile includes ads, banners, third party cookies, third party page counters, web bugs, hijackers and unwanted programs.
- Malware Domain List (MDL): This data from the Malware Domain List community project includes exploit kits, trojans, coin miners, phishing and ransomware.
You can find our new target on your policy creation screen, both in standard and expert mode. We strongly recommend adding it to your DNS Defense policy. To accommodate this change, we've also updated our own predefined policies.
If you need assistance updating your DNS Defense policy, check out our instructions here or contact ThreatSTOP's .
Looking to learn more about DNS Firewalls and why they're so important? Check out our quick blog post here. If you haven't yet, to quickly install a free 14-day ThreatSTOP trial, sign up below: