Business Wire

NEUSTAR

Share
Neustar Delivers UltraThreat Feeds for More Effective Data Security

Neustar® , Inc., a global information services company and leader in identity resolution, today announced the release of UltraThreat Feeds, a new service that provides its enterprise customers with access to real-time threat data to help them better identify cyber threats as they evolve. Designed by Neustar’s renowned security experts and leading academic researchers, the service – unique to Neustar – enables security and threat intelligence teams of all sizes to access threat feeds based on analysis and observations curated from Neustar’s expansive DNS, OneID and IP decisioning data.

Incorporating proprietary data derived from Neustar’s Security Portfolio & OneID identity resolution platform, UltraThreat Feeds can be ingested into a client’s existing platform to deliver superior threat data and provide valuable insights to unique and developing threats in near real-time.

“With the average cost of a data breach now at nearly $4 million, enterprises are investing significant resources into threat intelligence solutions to better defend themselves. A key change is enabling network and application security tools with improved real-time awareness of active threats,” said Rodney Joffe, security CTO, senior technologist and fellow at Neustar. “For example, SIEMs, TIPs, Next Gen Firewalls, IPS/IDS, WAFs, and DNS Firewalls all require threat data to power their security functions to detect and block malicious actors. Neustar’s UltraThreat Feeds service delivers deep, rich threat data, giving users the power to identify indicators of compromise or malicious activity in near real time and act accordingly to limit or even prevent attacks.”

UltraThreat Feeds enable Neustar customers to identify:

  • Malicious Domain Generation Algorithms (“DGAs”) – When malicious actors register one of the thousands of domains that are created by the DGAs within their malware, and that then allow the actors to control infected hosts from their Command and Control Servers (C2).
  • Suspicious DNS Tunneling Attempts – When Domains leverage the DNS protocol to create a “tunnel” to exfiltrate data past customers’ security measures.
  • Newly Observed Domains – When a Domain with little or no history is suddenly active, which presents increased risk.
  • Domain Updates (Nameserver or Hosting IP Address) – When there are indications that a domain has been hijacked.
  • Domain Spoofing (Business Email Compromise) – When fake online personas trick victims into making fraudulent transactions by imitating or resembling legitimate domains.

Neustar’s UltraThreat Feeds service has an advantage over competitors, thanks to the availability of its own unique data assets, including DNS data exhaust collected from the more than 100 billion queries received from 30 globally distributed nodes every day and supplemented by the IP address intelligence and analytics processed across Neustar’s product suite. Combined with behavioural analysis and pattern-based research, this advantage enables Neustar to derive truly unique insights into malicious activity. With insight gained from Neustar’s globally distributed authoritative and recursive DNS network, Neustar OneID, IP Intelligence geolocation and risk data, UltraThreat Feeds can provide a proprietary view of global threats to help identify and stop bad traffic, both inbound and outbound.

"With increasing attacker sophistication, and renewed aggression from nation-state adversaries focused on corporate espionage, many organisations are trying to find out how to properly leverage these [threat intelligence] services to protect themselves," wrote Forrester analysts Josh Zelonis and Joseph Blankenship in the report, The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019.

For more technical details on Neustar UltraThreat Feeds, visit https://www.home.neustar/security-intelligence/ultra-threat-detection-feeds .

-ENDS-

About Neustar

Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here: www.home.neustar .

Link:

ClickThru

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Ullevaal Stadium Among the First in the World to Install FIFA Quality Pro Certified LED Lighting System2.12.2025 15:15:00 CET | Press release

A newly installed, state-of-the-art LED lighting system at Ullevaal Stadium has transformed the playing, viewing, and entertainment experience for athletes and spectators, and has made Norway’s national stadium one of the few in the world with FIFA Quality Pro Certification. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251201171907/en/ The state-of-the-art TLC for LED® lighting system at Ullevaal Stadium has made Norway’s national stadium one of the few in the world with FIFA Quality Pro Certification. Home to Norway’s national football team, Ullevaal Stadium opened in 1926 and has a rich history of hosting significant sporting and entertainment events. When stadium ownership at the Football Association of Norway (NFF) decided to upgrade the venue’s lighting, they envisioned a system with the most advanced LED technology for the best possible playing, viewing, and entertainment experience. “Our main priorities for the new

Logical Intelligence Achieves 76 Percent on Putnam Benchmark, Highlighting Shift Beyond Large Language Models to Language-free, Mathematically Grounded Models2.12.2025 15:15:00 CET | Press release

Over the last decade, artificial intelligence (AI) has been largely built around large language models (LLMs). These systems are based on a language and guess words in a chain in the form of tokens. As a result, they frequently hallucinate and require vast compute and power infrastructure to solve tasks. The moment systems like public safety, national infrastructure, and industrial automation need logic, LLMs break and introduce safety risks. Token-free language independent models represent a new direction for AI. They do not predict words. They search for correct solutions and require less compute. Logical Intelligence is the first company building exclusively around mathematically derived, non autoregressive EBM (Energy Based Model) reasoning. Today, Logical Intelligence announced that its Aleph tool achieved a 76 percent score on the Putnam Benchmark, one of the most demanding mathematical reasoning tests in artificial intelligence. The benchmark measures a model’s ability to solve

MUSASHI JAPAN Launches “Gift Campaign 2025” - A Holiday Tradition Honoring Craftsmanship Through Meaningful Gifts2.12.2025 15:07:00 CET | Press release

MUSASHI JAPAN by TAIMATSU announces the return of its year-end celebration, Gift Campaign 2025, a seasonal tradition that transforms holiday shopping into an experience of appreciation, craftsmanship, and cultural generosity. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251202812444/en/ Rather than focusing on discounts, MUSASHI embraces the philosophy that true value lies in tools that last and in the gestures that accompany them. This year’s campaign invites customers to discover gifts that enrich their craft in the kitchen, each thoughtfully chosen to support the longevity and performance of every Musashi blade. Inspired by the Japanese principle of omotenashi, the campaign offers customers tiered gifts based on their total purchase amount, ensuring that every contribution is met with gratitude and purpose. From December 2 to December 25, 2025, customers shopping in MUSASHI JAPAN stores will receive: Tier 1: Oil and Rus

Invisible IT Emerges as Workplace Transformation Evolves, Lenovo Research Finds2.12.2025 15:00:00 CET | Press release

Four out of five IT leaders say their systems can’t keep up and are turning to AI-powered automation to make IT seamless, predictive, and proactive. The next step in workplace transformation is invisible technology that fades into the background so that support is automated and seamless, according to a Lenovo global survey of IT leaders released today. Most employees only notice IT when it slows them down and interrupts processes. Invisible IT is the opposite. It means technology that anticipates needs, prevents issues before they happen, and personalizes support automatically. Achieving Invisible IT, the newest report in Lenovo’s ongoing Work Reborn series, explores how AI and automation are redefining the digital workplace and employee experience. Of the IT leaders who participated, 79% aspire to deliver seamless, proactive support that minimizes disruption for employees, but only 21% have achieved predictive issue resolution. The results underscore an urgent need for organizations t

Wasabi Launches Covert Copy, a Completely Invisible and Indestructible Copy of Data for a Higher Level of Cloud Storage Security2.12.2025 15:00:00 CET | Press release

Key takeaways:A patent pending innovation in data protection that affords the best protection yet from ransomwareEnables account managers to create a hidden, immutable copy of data that is invisible to anyone inside the corporate networkSupports wide range of compliance requirements across all industries Wasabi Technologies, the hot cloud storage company, has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, advanced ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically air gapped and cannot be seen, accessed, modified or deleted, without multi-user authentication approval, protecting it from any type of malicious attack. Covert Copy strengthens and simplifies traditional air gap strategies by creating a copy of data that is not only isolated, but unable to be detected at all. As th

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye