+1.813.321.0987

BUSINESS PROTECT

Protection Against Ransomware and Malware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

protection against ransomware

USE CASES

 

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers

Prevent the exfiltration of sensitive data and intellectual property from infected machines

Detect malicious content hosted on your networks and servers

Improve incident response and forensic capabilities by providing your teams with meaningful information about threats

Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URLs from the latest malicious campaigns

– Hashes to verify the integrity of the downloaded data feed

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Full-use commercial license

– Monthly or 1-year subscriptions.

 

Learn More

Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (05/23/23 – 05/30/23)

Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the...

InfoSec Articles (05/09/23 – 05/23/23)

Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the...

InfoSec Articles (04/25/23 – 05/09/23)

Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the...

InfoSec Articles (03/28/2023 – 04/25/2023)

Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the...

InfoSec Articles (03/15/2023 – 03/28/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Earth Preta's Cyberespionage Campaign Hits Over 200" This study...

InfoSec Articles (02/28/2023 – 03/15/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "New HiatusRAT Router Malware", "#StopRansomware: Royal...

InfoSec Articles (02/14/2023 – 02/28/2023)

Over the past two weeks, we saw the new blog from TrendMicro presenting "A deep dive into the evolution of ransomware - Part 1". Also more relevant news such as "Social...

InfoSec Articles (02/02/2023 – 02/14/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Researchers Uncover 700+ Malicious Open Source Packages". Also,...

InfoSec Articles (01/16/2023 – 02/02/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Hackers now use Microsoft OneNote attachments to spread malware"....

InfoSec Articles (01/04/2023 – 01/16/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Abuse of Telegram bots for credential phishing increased 800% in...

InfoSec Articles (12/19/2022 – 01/04/2023)

Over the past two weeks, we saw the "Microsoft research uncovers new Zerobot capabilities" and also, "IcedID Botnet Distributors Abuse Google PPC to Distribute Malware"....

Finding the Best Threat Intelligence Vendor

Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing top-notch cyber threat...

InfoSec Articles (12/07/2022 – 12/19/2022)

Over the past two weeks, we saw "The Twelve Frauds of Christmas - Payment Diversion Fraud" which is a type of fraud where criminals target an individual to divert payments...

InfoSec Articles (11/22/2022 – 12/07/2022)

Over the past two weeks, we selected the cybersecurity highlights such as "Tractors vs. threat actors: How to hack a farm", "ChatGPT shows promise of using AI to write...

New OSINT Feeds: High Risk IPs – Risk Indicators – Tor Exit Nodes

Sharing is Caring To our industry's credit, there are many good OSINT feeds and data sharing platforms. Even better, they are relatively easy to find. A simple...

STAY CONNECTED

Sign up to receive updates and cybersecurity news.
Newsletter - Sidebar