BUSINESS PROTECT

DATA PACKAGE

Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

protection against ransomware

USE CASES

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

– Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers

– Prevent the exfiltration of sensitive data and intellectual property from infected machines

– Detect malicious content hosted on your networks and servers

– Improve incident response and forensic capabilities by providing your teams with meaningful information about threats

– Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– Bind9

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (02/15/21 – 03/01/21)

In the last two weeks' worth of infosec articles, we saw a lot of writing about APT activities and even a phishing attack method that uses Morse code to disguise malicious...

InfoSec Articles (01/31/21 – 02/14/21)

Onto the 2nd month of 2021, and we have seen supply-chain attacks, phishing campaigns, botnets, and ransomware such as the HelloKitty ransomware. CD Project disclosed that...

InfoSec Articles (01/16/21 – 01/30/21)

On to the end of January and we're seeing banking malware such as Vadokrist and many others. Vadokrist is written in Delphi and has an unusually large amount of unused code...

InfoSec Articles (01/01/21 – 01/15/21)

On to a new year, but it's still good to review some malware such as APT37 to help us understand more about cybercrimes. APT37 is associated with an attack that embeds macro...

InfoSec Articles (12/17/20 – 12/31/20)

On to the last day of the controversial year, cybercrime is still rife, as the attack activities of the Quasar Family. Quasar is an open-source RAT with a variety of...

InfoSec Articles (12/02/20 – 12/16/20)

A week before Christmas, cryptocurrency mining botnet PGMiner is showing smarter ways to hack into a victim's machine. At its core, PGMiner attempts to connect to the mining...

InfoSec Articles (11/17/20 – 12/01/20)

On to the start of the last month of the year and just around Thanksgiving, cyber crimes are still rampant. Even GoDaddy was also a victim of a scam using voice phishing or...

InfoSec Articles (11/02/20 – 11/16/20)

Several cases were observed where DLL side-loading was used to execute the malicious code. Side-loading is the use of a malicious DLL spoofing a legitimate one, relying on...

Threat Intelligence Data Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be...

InfoSec Articles (10/18/20 – 11/01/20)

Upon entering the second to the last month of the year, there are a lot of botnets, banking malware, and malware making the news. But one that stands out is Kimsuky. Kimsuky...

InfoSec Articles (10/03/20 – 10/17/20)

There has been a lot of RATs as well as botnets lately, such as HEH. HEH Botnet is spreading through brute force of the Telnet service on ports 23/2323. The bot does not...

InfoSec Articles (09/18/20 – 10/02/20)

One of the common malware being reported nowadays is the Remote Access Trojan or RAT, such as the LodaRAT. Written in Autolt, LodaRAT not only have abandoned their usual...

InfoSec Articles (09/03/20 – 09/17/20)

With almost everything being done online, cybercriminals were able to develop Baka skimmer to perform their goals. Baka skimmer has a sophisticated design intended to...

InfoSec Articles (08/19/20 – 09/02/20)

This batch of the most recent infosec articles from around the web, includes an evolution analysis of Transparent Tribe. In the last four years, Transparent Tribe has never...

InfoSec Articles (08/04/20 – 08/18/20)

Lots of malware have been creating cybercrime, but the old Agent Tesla uses new tricks to be able to stay on top. The Agent Tesla RAT has become one of the most prevalent...

STAY CONNECTED

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar