<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: threat-intelligence

ThreatSTOP Revolutionizes Security Industry with New Blockchain Offering

Photo Credit: LuckyStep48, Getty Images

In the past few years, we’ve seen a radical shift from traditional paradigms in transactions. With the emergence of blockchain, decentralized peer-to-peer transactions have replaced typical financial arrangements and revolutionized the financial world. In a few short years, the landscape for financial institutions has radically changed. Yet, the surface has barely been scratched in the ways blockchains can disrupt other entrenched industries. Enterprises have two choices, adopt the blockchain or be left in the stone age. The question is, why should your security program be any different?

Read More

Share this:

Sure, Just a Threat Feed Works. Like Biden Without Ray-Bans.

 

Sure, just any old threat feed will do. Like those one-size-fits-all “I Heart NY” shirts in Times Square. Just like Chipotle without guac (if you’re obsessed with both Chipotle and guac, like me) or Caesar salad with no… dressing. Laverne without Shirley, Biden without Ray-Bans, or maybe the internet without a politically topical meme. I’m going somewhere with this…. I promise.

Read More

Share this:

SANSFIRE 2016 -- See ThreatSTOP in Action

SANSFIRE 2016 will be here in just 51 days according to the official site. This is SANS national event in Washington DC and attracts one of the largest SANS audiences. Mark your calendars: June 11 - 18, 2016.

Read More

Share this:

Los Angeles Times: Why Hackers Are Not Lining Up to Help the FBI

In all of the debate around the Apple vs FBI tussle, many have wondered why someone has not simply stepped up and hacked the phone already.

Read More

Share this:

Don't Fall Prey to Ransomware

Ransomware is an ingenious method used by criminals to extract money from their victims. The basic scenario is:

Read More

Share this:

Does Scarlet Mimic Have You Seeing Red?

 

Read More

Share this:

ThreatSTOP Blocks Adwind -- new Cross-Platform RAT

Adwind (also known as AlienSpy, Frutas, jFrutas, Unrecom, Sockrat, JSocket, and jRat) is a relatively new cross-platform RAT (remote access trojan), discovered in late 2015 in a targeted attack on a bank in Singapore.

Read More

Share this:

SC Magazine: "After Norse: VCs, pros eye cyber investments"

The sudden demise of Norse Security has left many vendors and information security professionals in the industry wondering what happened. Brian Krebs wrote in detail about the activities that led up to Norse shuttering its operations over the weekend of January 30.

Read More

Share this:

I Smell a (Trochulis) RAT

BACKGROUND

Read More

Share this:

Wearables: The New Security Attack Frontier

Wearable devices are gaining traction, with estimates that more than 175 million will be in use by 2018. Today, one in five Americans own such a device, and one in 10 wears one daily (PwC). Most HR and IT departments have little concern for employees’ use of these devices. We don’t think of them as having a hard drive with sensitive data, or WiFi or cellular activity. In fact, no continuous connection to the Internet. You may want to think twice.

Read More

Share this: