<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: threatstop-in-use

ThreatSTOP 4.10 Release Notes

ThreatSTOP 4.10 Release Includes:

 

Read More

Share this:

Houdini's RAT Is No Disappearing Act

Most creators of Trojans or worms only known attribution to their creation is made by security researchers, and although, these individuals are not known in person, some of them are known and active in the cybercriminal scene. One of these “celebrity cyber criminals” is known by his alias Houdini, and according to Threatgeek.com is named 'Mohamed Benabdellah'. Houdini is believed to be based in  Algeria and connected to njq8” (aka ‘Naser Al Mutairi’) the developer of other RATs as "njRAT" and "njw0rm".

Read More

Share this:

DGAs For the Masses

At ThreatSTOP, we strive to provide our customers with the most up-to-date and accurate protection from both known and emerging threats. Using the data provided by our friends at the Qihoo 360 research team we have constructed a target list of over 20 identified malware families. The malware families that we will be protecting you against are:

Read More

Share this:

Don’t Pony Up Your Data to Fareit

Fareit, also known as Pony, is a data stealing Trojan that can decrypt or unlock passwords for over 110 different applications, including VPN, FTP, email, instant messaging, web browsers and much more. It is also capable of stealing a victim’s bitcoin wallets. Once it has collected its victim's data, Fareit uploads these stolen credentials to a remote Command and Control (C2) server the criminal has access to. Fareit is very dangerous because its infection on a computer can make the device part of a botnet, allowing the malware to use it to infect other devices.

Read More

Share this:

DNS Firewall: What Is It & Why Should You Have One?

What's DNS? 

Read More

Share this:

Sweeten Your Security with Honey

 

Read More

Share this:

“Book of Eli” malware

Africa-me.com and afkinsider.com recently reported that several African countries are amongst the most targeted countries by malware attacks and cyber criminals. One can speculate that these attack trends are motivated by relatively low user awareness to cyber security practices in these regions.

Read More

Share this:

Security Update - 11/10/2016

Three new allow lists were added to the ThreatSTOP Policy Builder. The following allow lists can be found under the “Allow” tab in the “Inbound Attacks (Servers)” category:

Read More

Share this:

New threat, old malware

After the recent major DDoS attacks on large entities such as KrebsOnSecurity and DYN by the Mirai botnet, a known threat on IoT devices, IRCTelnet, has returned and is a big concern for both users and researchers alike as it could prove to be just as far-reaching as the recent DDoS attacks.

Read More

Share this:

How secure are home robots?

A few of these potential security risks for home robots might seem a bit far-fetched, but Tom Byrnes, the CEO of malware protection company ThreatSTOP, says it’s too easy to assume a home robot (or a more “professional” bot used in a corporate setting) is impenetrable.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter