#Onpatrol4malware Blog

 

Malware Patrol – Protection Against Crypto Mining Abuse

Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for mining purposes. While promoted as an alternative to online ads, it is...

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques that complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection...

DDoS Reflection and Amplification Attacks

Reflections and amplifications are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP services to overload victims with response...

Malware Patrol Partners with Check Point Software

FOR IMMEDIATE RELEASE Malware Patrol Announces Partnership with Check Point Software Technologies Brazilian security company joins forces with the world’s leading internet security firm. São Paulo, Brazil – June 13, 2016 – Malware Patrol is excited to announce its new...

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block lists and data feeds, and that this must be a mistake. It...

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive their instructions, such as which institutions to target, the...

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

Connect

Newsletter

Sign up to receive our occasional updates and cybersecurity news.

Newsletter Recipient
Name*
Email*
   

Social Media