BUSINESS PROTECT

Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

 

  • Our database is updated constantly by crawlers in the cloud
  • Each indicator is verified daily
  • DNS names are resolved 4-6 times a day
  • Newly discovered URLs are processed within an hour.
protection against ransomware

USE CASES

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– Bind9

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (07/05/21 – 07/19/21)

Over the past 2 weeks, we saw Threat actors behind the infamous TrickBot malware have been linked to a new ransomware strain named “Diavol,”. Also, a new malware that...

InfoSec Articles (06/21/21 – 07/05/21)

Malware patrol selected some relevant news over the past 2 weeks. Microsoft has confirmed signing a malicious driver being distributed within gaming environments....

InfoSec Articles (06/07/21 – 06/21/21)

In the last two weeks of June, we saw the Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network...

Three Types of Cyber Threat Intelligence

Cyber threat intelligence (CTI) is one of the main pillars of cybersecurity strategies. Although it is not the answer to all cybersecurity problems, it is a very important...

InfoSec Articles (05/24/21 – 06/07/21)

At the end of March and beginning of June, we saw the Evolution of the JSWorm ransomware, the ransomware threat landscape has been gradually changing. We have been witness...

InfoSec Articles (05/10/21 – 05/24/21)

In the past two weeks of May, we noticed that the whole world is susceptible to cyber-attacks and even banks. Bizarro is another family of banking Trojans originating in...

InfoSec Articles (04/26/21 – 05/10/21)

At the end of April and the first week of March, we realized that cyberattacks do not rest, recently the Cybereason Nocturnus team responded to several incident response...

InfoSec Articles (04/12/21 – 04/26/21)

In the second half of April, we noticed a growing wave of cyber attacks Microsoft threat analysts have been tracking activity where contact forms published on websites are...

InfoSec Articles (03/29/21 – 04/12/21)

In this first half of April, we noticed that cyber threats are spreading all over the world and involve major investigations. This new threat, which we’ve named Janeleiro,...

InfoSec Articles (03/15/21 – 03/29/21)

In this second half of March, we observed an interesting email campaign by a threat actor we track as TA800. They distributed a new malware we are calling NimzaLoader. Also,...

InfoSec Articles (03/01/21 – 03/15/21)

In the first half of March, we recently observed a new series of Microsoft-themed phishing attacks. Also, with ransomware becoming the most significant cybersecurity threat...

InfoSec Articles (02/15/21 – 03/01/21)

In the last two weeks' worth of infosec articles, we saw a lot of writing about APT activities and even a phishing attack method that uses Morse code to disguise malicious...

InfoSec Articles (01/31/21 – 02/14/21)

Onto the 2nd month of 2021, and we have seen supply-chain attacks, phishing campaigns, botnets, and ransomware such as the HelloKitty ransomware. CD Project disclosed that...

InfoSec Articles (01/16/21 – 01/30/21)

On to the end of January and we're seeing banking malware such as Vadokrist and many others. Vadokrist is written in Delphi and has an unusually large amount of unused code...

InfoSec Articles (01/01/21 – 01/15/21)

On to a new year, but it's still good to review some malware such as APT37 to help us understand more about cybercrimes. APT37 is associated with an attack that embeds macro...

STAY CONNECTED

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar