BUSINESS PROTECT

Protection Against Ransomware and Malware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

 

  • Our database is updated constantly by crawlers in the cloud
  • Each indicator is verified daily
  • DNS names are resolved 4-6 times a day
  • Newly discovered URLs are processed within an hour.
protection against ransomware

USE CASES

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (11/8/2021 – 11/22/2021)

Over the past 2 weeks, we observed a QAKBOT operators resumed email spam operations towards the end of September after an almost three-month hiatus. The Federal Bureau of...

Avoiding Black Friday Phishing Scam

Black Friday is coming and threat actors are already surfing this wave of retail insanity. Not surprisingly, phishing remains an effective way to lure users into...

MISP Configuration Guide

MISP is a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise of targeted attacks, threat intelligence,...

Fortinet Configuration Guide

FortiGate NGFWs deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can weave security deep into...

InfoSec Articles (10/26/2021 – 11/8/2021)

Over the last two weeks, we observed a new threat referred to as “SQUIRRELWAFFLE” is being spread more widely via spam campaigns, infecting systems with a new malware...

InfoSec Articles (10/12/21 – 10/25/2021)

Over the past two weeks, we saw New PurpleFox botnet variant uses WebSockets for C2 communication. In addition, since July 2021, malicious cyber actors have used BlackMatter...

Mikrotik Configuration Guide

Malware Patrol provides a Mikrotik-compatible version of our Enterprise Malicious IPs and Malicious Domains data feeds."MikroTik is a Latvian company founded in...

What is Ransomware?

 Malware Patrol's CEO Andre Correa was recently interviewed by Dana Mantilia from Identity Protection Planning. They discussed the basics - and more - about ransomware:What...

InfoSec Articles (9/28/21 – 10/11/21)

Malware patrol selected some relevant cybersecurity news over the past 2 weeks. A survey of cyber investigators and antiabuse service providers to understand how ICANN’s...

InfoSec Articles (09/13/21 – 9/27/21)

In the past 2 weeks, CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) alerting...

InfoSec Articles (08/30/21 – 09/13/21)

In the first 2 weeks of September, we saw the LockFile is a new ransomware family that emerged in July 2021 following the discovery in April 2021 of the ProxyShell...

InfoSec Articles (08/16/21 – 08/30/21)

In the last 2 weeks of August, we saw campaigns use a multitude of infection components to deliver two widely popular commodity malware and remote access trojans (RATs):...

Best Practices to Protect Against Ransomware

Everyone wants to know how to protect against ransomware - 2021 is the year of ransomware! The Colonial Pipeline attack shutdown a major oil distribution line and held it...

InfoSec Articles (08/02/21 – 08/16/21)

In this first half of August, we saw that during Cyble’s routine Open-Source Intelligence (OSINT) research, we came across a malware posted by a researcher on Twitter. Also,...

InfoSec Articles (07/19/21 – 08/02/21)

Over the past two weeks, we saw that the Government sanctioned cyber-surveillance is back in the news, following an exposé that reveals how commercial malware is being used...

STAY CONNECTED

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar