<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Modern threat activity rarely respects borders, applications, or traditional security boundaries. Attackers routinely leverage geographic infrastructure, consumer platforms, and popular communication services to blend malicious activity into normal traffic. At ThreatSTOP, we focus on giving organizations precise control over where their networks connect and which applications are allowed to communicate.</p> <!--more--><p>Today, we are announcing the immediate availability of new geographic based and application based protection targets, giving customers greater flexibility to allow or restrict traffic with confidence and intent.</p> <p>All protections are created and maintained by the ThreatSTOP Security, Intelligence, and Research team, and are available across Protective DNS and IP Defense environments.</p> <h3><strong>New Geographic Based IP and Domain Protections</strong></h3> <p>Geographic controls remain a foundational requirement for organizations managing regulatory exposure, operational risk, or regional access policies. These new geographic targets allow customers to explicitly allow or restrict traffic at both the domain and IP layers based on country of origin.</p> <p>The following country level protections are now available:</p> <ul> <li> <p><span><strong>SL</strong></span> Sierra Leone</p> </li> <li> <p><span><strong>KW</strong></span> Kuwait</p> </li> <li> <p><span><strong>PS</strong></span> Palestinian Territories</p> </li> <li> <p><span><strong>QA</strong></span> Qatar</p> </li> <li> <p><span><strong>JO</strong></span> Jordan</p> </li> <li> <p><span><strong>BH</strong></span> Bahrain</p> </li> <li> <p><span><strong>AE</strong></span> United Arab Emirates</p> </li> <li> <p><span><strong>MR</strong></span> Mauritania</p> </li> <li> <p><span><strong>OM</strong></span> Oman</p> </li> <li> <p><span><strong>SA</strong></span> Saudi Arabia</p> </li> <li> <p><span><strong>EG</strong></span> Egypt</p> </li> <li> <p><span><strong>TN</strong></span> Tunisia</p> </li> <li> <p><span><strong>DJ</strong></span> Djibouti</p> </li> <li> <p><span><strong>KM</strong></span> Comoros</p> </li> <li> <p><span><strong>DZ</strong></span> Algeria</p> </li> <li> <p><span><strong>MA</strong></span> Morocco</p> </li> <li> <p><span><strong>TW</strong></span> Taiwan</p> </li> <li> <p><span><strong>TH</strong></span> Thailand</p> </li> <li> <p><span><strong>GD</strong></span> Grenada</p> </li> <li> <p><span><strong>PH</strong></span> Philippines</p> </li> <li> <p><span><strong>DM</strong></span> Dominica</p> </li> </ul> <p>These targets give security teams the ability to align network access with business operations, regulatory requirements, and threat intelligence insights. Whether restricting exposure to high risk regions or explicitly allowing trusted geographies, Protective DNS and IP Defense make geographic policy enforcement straightforward and auditable. &nbsp;These are available in our <span style="font-weight: bold;">Governance</span> Bundle.</p> <h3><strong>Expanded Application Control Protections</strong></h3> <p>Applications are frequently abused as cover for data exfiltration, command and control communication, and policy evasion. Popular consumer and collaboration platforms are especially attractive due to their global footprint and trusted reputation.</p> <p>Our Application Control Bundle has been expanded with new protections that allow organizations to control application traffic at the domain and IP layers.&nbsp;</p> <p>Newly available application protections include:</p> <ul> <li> <p>eBay</p> </li> <li> <p>AliExpress</p> </li> <li> <p>Temu</p> </li> <li> <p>Wish</p> </li> <li> <p>Etsy</p> </li> <li> <p>Rakuten</p> </li> <li> <p>WhatsApp</p> </li> <li> <p>Telegram</p> </li> <li> <p>Facebook Messenger</p> </li> <li> <p>Snapchat</p> </li> <li> <p>Zoom</p> </li> <li> <p>YouTube</p> </li> <li> <p>QQ</p> </li> <li> <p>Gemini</p> </li> </ul> <p>These controls support a wide range of use cases, including reducing shadow IT, limiting unsanctioned communications channels, preventing data leakage, and enforcing acceptable use policies. By applying protections through Protective DNS and IP Defense, customers gain consistent enforcement across on premises networks, cloud environments, and security controls such as firewalls and AWS WAF.</p> <h3><strong>Proactive Protection Built for Real World Threats</strong></h3> <p>Every new target is developed with real world abuse patterns in mind. The ThreatSTOP Security, Intelligence, and Research team continuously analyzes command and control activity, phishing infrastructure, peer to peer communication, data exfiltration techniques, DDoS behavior, and invalid traffic trends.</p> <p>By translating intelligence into immediately usable protections, ThreatSTOP enables organizations to reduce exposure before incidents occur, not after alerts are triggered.</p> <h3><strong>Take the Next Step with ThreatSTOP</strong></h3> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers. Get started with <a href="https://admin.threatstop.com/register?hsLang=en" rel="noopener" target="_blank">a Demo today</a>.</p> <p><strong>Connect with Customers, Disconnect from Risks</strong></p> <h3><strong>MITRE ATT&amp;CK Framework Mapping</strong></h3> <p>&nbsp;</p> <table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;"> <thead> <tr> <th> <p><strong>Threat Activity Addressed</strong></p> </th> <th> <p><strong>MITRE Technique</strong></p> </th> <th> <p><strong>Description</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Command and control traffic</p> </td> <td> <p>T1071</p> </td> <td> <p>Application layer protocol abuse</p> </td> </tr> <tr> <td> <p>Command and control over common services</p> </td> <td> <p>T1071.001</p> </td> <td> <p>Web protocols</p> </td> </tr> <tr> <td> <p>Application abuse and covert communications</p> </td> <td> <p>T1090</p> </td> <td> <p>Proxy and relay techniques</p> </td> </tr> <tr> <td> <p>Data exfiltration via applications</p> </td> <td> <p>T1041</p> </td> <td> <p>Exfiltration over command and control channel</p> </td> </tr> <tr> <td> <p>Geographic infrastructure abuse</p> </td> <td> <p>T1583</p> </td> <td> <p>Acquire infrastructure</p> </td> </tr> <tr> <td> <p>Network denial and disruption</p> </td> <td> <p>T1498</p> </td> <td> <p>Network denial of service</p> </td> </tr> </tbody> </table> <p>&nbsp;</p> <p>&nbsp;</p></span>