#Onpatrol4malware Blog


Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques that complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection attacks. This post was...

DDoS Reflection and Amplification Attacks

Reflections and amplifications are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP services to overload victims with response traffic. Attackers usually...

Malware Patrol Partners with Check Point Software

FOR IMMEDIATE RELEASE Malware Patrol Announces Partnership with Check Point Software Technologies Brazilian security company joins forces with the world’s leading internet security firm. São Paulo, Brazil – June 13, 2016 – Malware Patrol is excited to announce its new...

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block lists and data feeds, and that this must be a mistake. It didn't take much time...

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive their instructions, such as which institutions to target, the encryption keys for...

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.



Sign up to receive our occasional updates and cybersecurity news.

Newsletter Recipient

Social Media