<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: cyber-security

How to Easily & Efficiently Secure Your Home DNS

Like many technologists who are also parents, I think a great deal on how best to protect my family online. Working for a security company, I have access to more tools than the average person, so recently I’ve implanted DNS security at home. I focused more on DNS because there are no “services” offered on my home network, and I’m mostly concerned more about my kids or wife clicking on a phishing link or similar outbound malicious traffic.

Read More

Share this:

Why You Need to Block the Threat Factory. Not Just the Threats.

 

Cyber criminals will create roughly 100 million new malware variants over the next 12 months. Security vendors will respond with new malware signatures and behaviors to stop them, but thousands of companies will be victimized in the process, experiencing costly or catastrophic breaches. This isn’t new - it’s a cycle.

Read More

Share this:

Over 120 Malicious Domains Discovered in Analysis on New Roaming Mantis Campaign

Since April of this year, news of a rapidly evolving crypto mining malware, dubbed Roaming Mantis, has hit the cyber news headlines. Roaming Mantis debuted with a DNS hijacking attack vector, infecting android running machines. Once installed, the malware redirected infected devices to phishing sites by spoofing legitimate applications, while using the stolen credentials to run a crypto mining script on PCs.

Read More

Share this:

Universities Beware: Attackers Are Getting Savvy with Fake Cyber Security Courses

Is your university protected? Iranian hackers attempted to attack U.K. universities with fake, government-certified cyber security courses. They accessed at least one college account.

Read More

Share this:

Torii: The New IoT Botnet You Might Need to Start Worrying About

An extremely sophisticated IoT botnet has recently been discovered and dubbed “Torii.” One of Torii malware’s many advanced capabilities is running on just about every type of smartphone, computer and tablet, with over 100 malware variants supporting over 15 different architectures.

Read More

Share this:

Bite Size Security News: Now Is The Time For Zero Trust Security

Zero Trust Networking is that all network communication should be considered untrusted unless otherwise designated as safe (i.e. with authentication, a known source, or other criteria).

Read More

Share this:

Bite Size Security News: Apple Denies Cybersecurity Breach to Congress

Summary

Read More

Share this:

John Bambenek Speaking at Infragard Symposium: A Primer on Cyber Security Intelligence & the Need For Threat Sharing

Read More

Share this:

Bite Size Security News: What Facebook's Breach Means

Organizations store and maintain more consumer data than ever and the failure to protect it (or having it breached) can mean real losses. One estimate suggests Facebook may by on the hook for over a $1B USD fine for the current breach.

Read More

Share this:

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter