ThreatLocker Profile Banner
ThreatLocker Profile
ThreatLocker

@ThreatLocker

Followers
2K
Following
2K
Media
1K
Statuses
3K

ThreatLocker protects against zero-day exploits and cyberattacks by giving you complete control over what runs in your organization.

Florida, USA
Joined May 2017
Don't wanna be here? Send us removal request.
@ThreatLocker
ThreatLocker
7 hours
Guests at our Black Hat USA welcome reception at Ri Ra Irish Pub in Mandalay Bay Shoppes were treated to lively Irish music and an open bar. Three cheers for Black Hat! It’s already a great week here in Las Vegas! #blackhat2025 #blackhatusa #threatlocker #cybersecurity
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
1
@ThreatLocker
ThreatLocker
7 hours
Orlando small business leaders are invited to a free cybersecurity masterclass hosted by ThreatLocker CEO Danny Jenkins. Includes dinner. Bring your business laptop to receive security tips tailored to your environment. August 21, 6 to 8 p.m. at ThreatLocker headquarters
Tweet media one
0
0
0
@ThreatLocker
ThreatLocker
1 day
ThreatLocker® is now listed on the FedRAMP Marketplace .Our deny-by-default endpoint protection helps organizations enforce Zero Trust and accelerate CMMC. #Cybersecurity #ZeroTrust #CMMC #FedRAMP
Tweet media one
1
0
2
@ThreatLocker
ThreatLocker
1 day
Misconfigurations are a leading cause of breaches. The new ThreatLocker DAC dashboard gives IT teams real-time visibility into risks and compliance gaps, mapped to frameworks like NIST, CIS, and more. Now part of ThreatLocker core platform. #ThreatLocker
Tweet media one
0
0
1
@ThreatLocker
ThreatLocker
6 days
SafePay ransomware is ramping up—with mutexes, double extortion, and LockBit-inspired code. Here’s what ThreatLocker Detect uncovered, and how to stay ahead: #ransomware #infosec #SafePay #cyberthreats #IOCs #TTPs #ThreatIntel #ZeroTrust.
Tweet card summary image
threatlocker.com
Observing SafePay ransomware, the ThreatLocker Detect team has seen Mutexes being created to prevent additional copies of the ransomware running on already affected/encrypted devices.
0
3
2
@ThreatLocker
ThreatLocker
13 days
We are on a mission to keep cybercriminals out of your business. So, we will always advocate for least privilege access and encourage you to build a proactive, Zero Trust architecture. Here are 10 proven actions to harden enterprise environments, stop ransomware in its tracks,.
0
2
3
@ThreatLocker
ThreatLocker
14 days
ToolShell is targeting all supported on-prem SharePoint versions via unauthenticated RCE (CVE-2025-53770, 53771). Here is how to protect your business. #SharePoint #ZeroDay #ThreatIntel #Cybersecurity
Tweet media one
0
0
2
@ThreatLocker
ThreatLocker
21 days
Heading to Black Hat next month? Stop by our booth #1933 Aug. 6–7 and be among the first to learn about the latest solution developments at ThreatLocker. #BlackHat2025 #ZeroTrust #SecurityOps #EndpointHardening #ITSecurity #ThreatLocker
Tweet media one
2
0
1
@ThreatLocker
ThreatLocker
29 days
Is shadow IT still slipping past your defenses? If you're not enforcing an approved software list and denying everything else by default, you're not in control. How are you locking down unauthorized apps? #cybersecurity #zerotrust #shadowIT #appcontrol
Tweet media one
1
0
3
@ThreatLocker
ThreatLocker
1 month
Scattered Spider is tricking help desks into installing tools like AnyDesk. These are legitimate apps used the wrong way. If you block by default, you break that chain. What is your team doing to stop approved tools from becoming attack vectors? #cybersecurity #zerotrust
Tweet media one
0
0
2
@ThreatLocker
ThreatLocker
1 month
The Cyber Hero® team is on fire after the incredible experience at this year's Kaseya DattoCon Europe in Dublin!. The buzz of ideas we exchanged at the @ThreatLocker booth and beyond has further fueled our ambition to tackle the ever-evolving challenges in cybersecurity. We
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
4
@ThreatLocker
ThreatLocker
1 month
Week 6 of our cybersecurity series "100 days to secure your environment" is live! . This week, we’re diving into essential patching and backup strategies. Don’t miss out on tips for keeping your applications updated and your backups safe! .
Tweet card summary image
threatlocker.com
Week 6: Patching and backups
0
0
0
@ThreatLocker
ThreatLocker
1 month
Join @ThreatLocker at @BlackHatEvents in Vegas! . Visit booth 1933 for Threat Talks and demos on Zero Trust controls. Don’t miss CEO Danny Jenkins' session "Simplifying cybersecurity" on Aug 7 at 10:15 a.m. Use code THREATLOCKER to save $200:.
Tweet card summary image
threatlocker.com
See ThreatLocker® in person at Black Hat USA 2025! Check out the full schedule of where ThreatLocker® will be during the Black Hat Briefings cybersecurity conference and have the opportunity to speak...
0
3
4
@ThreatLocker
ThreatLocker
2 months
Is your organization managing a significant number of potentially harmful browser extensions? . Discover effective strategies to mitigate these risks and implement blocking measures.
0
0
2
@ThreatLocker
ThreatLocker
2 months
Password-protected screensavers are crucial for endpoint security in a Zero Trust framework. Here's how to implement password-protected screensavers in @Windows using Group Policy, PowerShell, or @ThreatLocker settings:. #CyberSecurity #ZeroTrust.
Tweet card summary image
threatlocker.com
Here are three methods to configure a secure screensaver on a Windows workstation that requires a password upon return, to help prevent unauthorized access when devices are idle.
0
0
1
@ThreatLocker
ThreatLocker
2 months
Visit the @ThreatLocker booth at @KaseyaCorp @datto con Europe today and join us for the Elements After Party at @JTPims in Dublin from 7-11 p.m. Try our exclusive Cyber Hero® Lock-a-rita: 40ml Olmeca Reposado, 20ml Blue Curacao, 25ml lime juice, 15ml pomegranate syrup, and a
Tweet media one
Tweet media two
Tweet media three
0
0
1
@ThreatLocker
ThreatLocker
2 months
The @Microsoft 2024 Digital Defense Report states that 70% of successful cyberattacks involve remote encryption, with 92% originating from unmanaged devices. Attackers can use legitimate tools like PsExec to encrypt files without malware. See some ideas on how to protect your
0
0
2
@ThreatLocker
ThreatLocker
2 months
In the week four of "100 days to secure your environment" webinar series, we explored key cybersecurity strategies, including Multi-Factor Authentication (MFA), least privilege user permissions, and Microsoft 365 Conditional Access. What specific actions will you take to boost.
0
0
2