<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: threat-intelligence

SANSFIRE 2016 -- See ThreatSTOP in Action

SANSFIRE 2016 will be here in just 51 days according to the official site. This is SANS national event in Washington DC and attracts one of the largest SANS audiences. Mark your calendars: June 11 - 18, 2016.

Read More

Share this:

Los Angeles Times: Why Hackers Are Not Lining Up to Help the FBI

In all of the debate around the Apple vs FBI tussle, many have wondered why someone has not simply stepped up and hacked the phone already.

Read More

Share this:

Don't Fall Prey to Ransomware

Ransomware is an ingenious method used by criminals to extract money from their victims. The basic scenario is:

Read More

Share this:

Does Scarlet Mimic Have You Seeing Red?

 

Read More

Share this:

ThreatSTOP Blocks Adwind -- new Cross-Platform RAT

Adwind (also known as AlienSpy, Frutas, jFrutas, Unrecom, Sockrat, JSocket, and jRat) is a relatively new cross-platform RAT (remote access trojan), discovered in late 2015 in a targeted attack on a bank in Singapore.

Read More

Share this:

SC Magazine: "After Norse: VCs, pros eye cyber investments"

The sudden demise of Norse Security has left many vendors and information security professionals in the industry wondering what happened. Brian Krebs wrote in detail about the activities that led up to Norse shuttering its operations over the weekend of January 30.

Read More

Share this:

I Smell a (Trochulis) RAT

BACKGROUND

Read More

Share this:

Wearables: The New Security Attack Frontier

Wearable devices are gaining traction, with estimates that more than 175 million will be in use by 2018. Today, one in five Americans own such a device, and one in 10 wears one daily (PwC). Most HR and IT departments have little concern for employees’ use of these devices. We don’t think of them as having a hard drive with sensitive data, or WiFi or cellular activity. In fact, no continuous connection to the Internet. You may want to think twice.

Read More

Share this:

Bah-Humbug: Targeting Children’s Identities During the Holiday Season

Two recent massive breaches appear to be targeting children’s identities—attacks on VTech and Hello Kitty. Stealing the identities of children is not only far more morally egregious than targeting adults, the crimes will likely not be uncovered for many years—no one expects their child’s identity to be stolen, and therefore do not monitor for such activity. It is usually detected when a child matures and seeks to secure credit for a student loan or first auto loan, only to find these credit facilities unavailable at a critical point in young adulthood.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter