<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: security

ThreatSTOP & The Libssh Vulnerability: What You Need To Know

This week, the libssh project announced a serious bug in versions of their library released in the last few years.

Read More

Share this:

Bite Size Security News: Apple Denies Cybersecurity Breach to Congress

Summary

Read More

Share this:

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

Read More

Share this:

My Conversations with Guccifer 2.0 & the Surprising Election Influence Operations

As attention turns to the cyber threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can presumably except coming up) There were multiple aspects to my research and human intelligence operations exploring what was going on behind the scenes in 2016, but this article focuses on only one, Guccifer 2.0.

Read More

Share this:

3 New Targets Protecting Against Drive-By Attacks

We are happy to announce the release of 3 new targets, specifically protecting against Drive-By attacks. In a drive-by attack, web sites are used as malware droppers. The targets include manually identified domains, as well as domains identified by running known botnet domain generation algorithms. These 3 new targets are built for users to choose the level of protection that accommodates their needs.


The 3 new targets are:

Read More

Share this:

Why Switch When You Can Keep the Service You Trust? Infoblox ActiveTrust vs. ThreatSTOP DNS Firewall Service

 

Received a notice from Infoblox lately?

If you’re a DNS Legacy Firewall customer, you’ve probably gotten a warning to migrate to ActiveTrust by end of January….. or else. However, that’s not the case. The Threat Intelligence/RPZ Feed you’ve been utilizing with Infoblox is a ThreatSTOP powered service and it’s still operational. We’ve also been developing and improving our product, now offering our new, Next Generation DNS Firewall Service to active subscribers without any added charges.   

Read More

Share this:

SC Magazine: ThreatSTOP CEO Talks IoT Security for Healthcare Industry

ThreatSTOP CEO and Founder Tom Byrnes recently spoke with SC Magazine about the inherent security risks of IoT devices in the healthcare industry.

Read More

Share this:

Senate Floats Encryption Bill (Ack)

Just as What’s App began offering end-to-end encryption for its one billion plus users that effectively prevents anyone--including law enforcement--from reading users’ messages, members of the Senate floated the first draft of a bill aptly named "Compliance with Court Orders Act of 2016.” The bill seeks to require compliance with court orders for data.

Read More

Share this:

Locky Ransomware Domains - Followup Analysis Uncovers 130 New Indicators

Recently, there has been a lot of buzz over a flourishing ransomware that goes by the name of Locky, which encrypts a victim's data using a strong RSA-2048+AES-128 encryption and then demands between 0.5-2 bitcoins for the decryption of that data.

Read More

Share this:

Los Angeles Times: Why Hackers Are Not Lining Up to Help the FBI

In all of the debate around the Apple vs FBI tussle, many have wondered why someone has not simply stepped up and hacked the phone already.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter