<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: security

Cybercrime Against Healthcare Soars During COVID-19

Healthcare has been one of the most severely impacted industries by the still-menacing COVID-19 virus. The sudden global pandemic created a surge in demand for clinical care, medical equipment, healthcare technologies and eventually - a solution. All of these and more rely on information technology. From making appointments and delivering healthcare to patients, to using internet-connected medical devices and developing vaccine research, COVID-19 response is vulnerable to cyber attacks on all levels. Being by far the most pressing issue today, it comes as no surprise that attackers are exploiting the difficult situation healthcare institutions are facing to wreak havoc and cash in on their struggle.

Read More

Share this:

Awesome New Password Protection Feature Added to Chrome

At ThreatSTOP we are unapologetic security geeks, we also happen to be security minimalists. In fact, we think anyone passionate about The Cybers aims to maximize protection with the fewest tools. Why? Because tools break, they have vulnerabilities, they cost money, they require care and feeding, etc. etc.. Is it crazy to think you can secure a network really well with only ThreatSTOP, a firewall, a DNS server, and good password hygiene? Heck no, that's not crazy, what is crazy is that a huge percentage of businesses (skewing to SMB of course) don't even check those minimums off the security must-have list, while lots of companies conversely have become collectors, with a SOC that looks like a virtual RSA tradeshow. So while we daydream about a future where enterprises don't have either zero or 70 different security products that aren't playing nice together, check out our favorite new tool (hah!) for managing passwords:

Google has announced a ton of new password protection features this week after releasing Chrome 88. The new browser version provides users with an easy shortcut to identify weak or compromised passwords and quickly change them. The new key icon will appear under your profile avatar, and clicking it will begin Google’s check for weak passwords. If found, the browser will immediately alert you and offer a one-click password change. Chrome 88 will also let users manage and update multiple passwords in the same place. This feature is currently available for desktop and iOS versions, and will be available for the Android Chrome app soon. Google has already seen a 37% reduction in compromised credentials in 2020 based on the Chrome Safety Check features and other improvements made last year. Today, Chrome’s safety check is used 14 million times every week.

Read More

Share this:

ThreatSTOP & The Libssh Vulnerability: What You Need To Know

This week, the libssh project announced a serious bug in versions of their library released in the last few years.

Read More

Share this:

Bite Size Security News: Apple Denies Cybersecurity Breach to Congress

Summary

Read More

Share this:

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

Read More

Share this:

My Conversations with Guccifer 2.0 & the Surprising Election Influence Operations

As attention turns to the cyber threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can presumably except coming up) There were multiple aspects to my research and human intelligence operations exploring what was going on behind the scenes in 2016, but this article focuses on only one, Guccifer 2.0.

Read More

Share this:

3 New Targets Protecting Against Drive-By Attacks

We are happy to announce the release of 3 new targets, specifically protecting against Drive-By attacks. In a drive-by attack, web sites are used as malware droppers. The targets include manually identified domains, as well as domains identified by running known botnet domain generation algorithms. These 3 new targets are built for users to choose the level of protection that accommodates their needs.


The 3 new targets are:

Read More

Share this:

Why Switch When You Can Keep the Service You Trust? Infoblox ActiveTrust vs. ThreatSTOP DNS Firewall Service

 

Received a notice from Infoblox lately?

If you’re a DNS Legacy Firewall customer, you’ve probably gotten a warning to migrate to ActiveTrust by end of January….. or else. However, that’s not the case. The Threat Intelligence/RPZ Feed you’ve been utilizing with Infoblox is a ThreatSTOP powered service and it’s still operational. We’ve also been developing and improving our product, now offering our new, Next Generation DNS Firewall Service to active subscribers without any added charges.   

Read More

Share this:

SC Magazine: ThreatSTOP CEO Talks IoT Security for Healthcare Industry

ThreatSTOP CEO and Founder Tom Byrnes recently spoke with SC Magazine about the inherent security risks of IoT devices in the healthcare industry.

Read More

Share this:

Senate Floats Encryption Bill (Ack)

Just as What’s App began offering end-to-end encryption for its one billion plus users that effectively prevents anyone--including law enforcement--from reading users’ messages, members of the Senate floated the first draft of a bill aptly named "Compliance with Court Orders Act of 2016.” The bill seeks to require compliance with court orders for data.

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter