<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Multiple Government Entities Targeted with Massive DNS Attacks

Image via Technology Times

In recent weeks, reports have emerged that various government entities have been the target of DNS hijacking attacks. These attacks would redirect those attempting to interact with legitimate government sites and instead send them to malicious infrastructure who could engage in phishing attacks, email theft, or a wide variety of misconduct.

Read More

Share this:

How Malvertising Leads to Fake Flash Malware

It’s no secret that the pervasiveness of ad networks has greatly diminished the web browsing experience in recent years. With this has also come criminals and other miscreants who are using the drive for web advertising revenue to deliver malware.

Read More

Share this:

Why You Need to Block the Threat Factory. Not Just the Threats.

 

Cyber criminals will create roughly 100 million new malware variants over the next 12 months. Security vendors will respond with new malware signatures and behaviors to stop them, but thousands of companies will be victimized in the process, experiencing costly or catastrophic breaches. This isn’t new - it’s a cycle.

Read More

Share this:

Axim & ThreatSTOP Live Webcast: January 24. John Bambenek Talks Reducing Your Attack Surface with Threat Intelligence

Gathering and implementing threat intelligence is overwhelming, but it can be done in an extremely effective and uncomplicated way. John Bambenek, ThreatSTOP's VP of Security and Research, will talk about the threat landscape's new reality, where attackers are financially motivated pros, visibility into threats is limited and the attack surface has grown exponentially. (There have been 96M malware variants since 2016) With this, utilizing threat intelligence the right way (combined with modern packet capture) is essential to IT security and compliance.

Read More

Share this:

BrightTALK Webcast: December 13. John Bambenek Talks Predictions for 2019's Threat Landscape.

As part of BrightTALK's 2019 Trends and Predictions Webcast series, ThreatSTOP's VP of Security and Research, John Bambenek, is talking specifically about social engineering and phishing on this December 13th episode. Check out the details here:

Read More

Share this:

Searching for Cisco Umbrella Alternatives? Your Affordable Option for DNS Security with Advanced Reporting.

Looking for an affordable alternative to Cisco Umbrella Enterprise's high cost? ThreatSTOP comes with advanced reporting and security research tools out-of-the-box. See blocked threats, remediate client machines faster and check IOC’s. Here's a breakdown of how ThreatSTOP and Cisco line up.

Read More

Share this:

Over 120 Malicious Domains Discovered in Analysis on New Roaming Mantis Campaign

Since April of this year, news of a rapidly evolving crypto mining malware, dubbed Roaming Mantis, has hit the cyber news headlines. Roaming Mantis debuted with a DNS hijacking attack vector, infecting android running machines. Once installed, the malware redirected infected devices to phishing sites by spoofing legitimate applications, while using the stolen credentials to run a crypto mining script on PCs.

Read More

Share this:

How to Keep Online Holiday Shopping Safe. Plus, Identifiable Warning Signs of Malicious Ukrainian JavaScript.

As we’re approaching the holiday season, so many are heavily relying on the internet for their shopping. With fewer than 50 online shopping days until Christmas, pressure to bargain hunt is skyrocketing, with retailers gearing up to make tempting offers on those dream items. However, it's not just the online retailers gearing up to take your money, the online criminals are, too.

Read More

Share this:

Need Affordable Cisco Umbrella Alternatives? This Chart Is Clutch.

Whether you're a company looking for an affordable alternative to Cisco Umbrella Enterprise's high cost, or looking for a solution with more features, better support & granular reporting, here's a breakdown of how ThreatSTOP and Cisco line up.

Read More

Share this:

Attackers Are Targeting Healthcare: Here's 4 Things You Need to Do Now

In the third quarter of 2018 alone, 4.4 million patient records were compromised across 117 disclosed health data breaches. This shows that health care continues to be targeted by criminals. The largest breach was UnityPoint, with 1.4 million records compromised.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter