Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect package offers highly reliable feeds of ransomware and malware URLs. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software – no API required – and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

protection against ransomware


There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

– Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers

– Prevent the exfiltration of sensitive data and intellectual property from infected machines

– Detect malicious content hosted on your networks and servers

– Improve incident response and forensic capabilities by providing your teams with meaningful information about threats

– Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details



– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.



– ClamAV Virus DB

– pfSense / pfBlockerNG

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy




– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (10/03/20 – 10/17/20)

There has been a lot of RATs as well as botnets lately, such as HEH. HEH Botnet is spreading through brute force of the Telnet service on ports 23/2323. The bot does not...

InfoSec Articles (09/18/20 – 10/02/20)

One of the common malware being reported nowadays is the Remote Access Trojan or RAT, such as the LodaRAT. Written in Autolt, LodaRAT not only have abandoned their usual...

InfoSec Articles (09/03/20 – 09/17/20)

With almost everything being done online, cybercriminals were able to develop Baka skimmer to perform their goals. Baka skimmer has a sophisticated design intended to...

InfoSec Articles (08/19/20 – 09/02/20)

This batch of the most recent infosec articles from around the web, includes an evolution analysis of Transparent Tribe. In the last four years, Transparent Tribe has never...

InfoSec Articles (08/04/20 – 08/18/20)

Lots of malware have been creating cybercrime, but the old Agent Tesla uses new tricks to be able to stay on top. The Agent Tesla RAT has become one of the most prevalent...

InfoSec Articles (07/20/20 – 08/03/20)

We have now come into a new month, and this set of InfoSec articles discusses how some specific malware operates. One of these is the Evilnum malware which was previously...

InfoSec Articles (07/05/20 – 07/19/20)

Onto the second half of 2020, and a lot of trojans are actively upping their game to spread banking malware. One of these is Trojan Cerberus which disguised itself as a...

InfoSec Articles (06/20/20 – 07/04/20)

The latter half of the year has already begun, and cybercrimes show no signs of stopping. Just like how they're using Cobalt Strike to deploy Anchor backdoor and RYUK...

InfoSec Articles (06/05/20 – 06/19/20)

Ransomware and malware, such as GuLoader, have been very active in campaigns against security. GuLoader is used to deliver malware with the help of cloud services such as...

InfoSec Articles (05/21/20 – 06/04/20)

Half of 2020 is here and malware such as Mylobot, ComRAT, and the likes have also upgraded their game. Mylobot has the ability to download and execute any type of payload...

InfoSec Articles (05/06/20 – 05/20/20)

Ransomware has topped this InfoSec articles. One of which is the Netwalker ransomware. This involves malware that is not compiled but written in PowerShell and executed...

InfoSec Articles (04/21/20 – 05/05/20)

Among the cybercrime known to us, EventBot seems to be a real threat among many users. EventBot is targeting financial applications and steal SMS messages to allow malware...

DoH! Not so great to the Enterprise

DoH, or DNS over HTTPS (RFC 8484), is  a relatively new protocol that provides increased privacy and security. It does this by encrypting DNS queries and responses, which...

InfoSec Articles (04/06/20 – 04/20/20)

xHelper, together with other malware and threat attacks, have added to the concerns of Android users. Read about this threat and more in the latest security industry news...

InfoSec Articles (03/22/20 – 04/05/20)

Cyber attacks, phishing, stalkerware, and malware such as Emissary Panda, have been rampant. They're taking advantage of the vulnerabilities in organizations and even...


Sign up for our newsletter to receive occasional updates and cybersecurity news.
Newsletter - Sidebar