+1.813.321.0987

BUSINESS PROTECT

Protection Against Ransomware and Malware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

 

  • Our database is updated constantly by crawlers in the cloud
  • Each indicator is verified daily
  • DNS names are resolved 4-6 times a day
  • Newly discovered URLs are processed within an hour.
protection against ransomware

USE CASES

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (04/25/2022 – 05/09/2022)

Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling...

InfoSec Articles (04/11/2022 – 04/25/2022)

Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement regarding their...

InfoSec Articles (03/28/2022 – 04/11/2022)

Over the last two weeks, we saw that "from the beginning of 2022, we have dealt with six different strains of wiper malware targeting Ukraine: WhisperKill, WhisperGate,...

InfoSec Articles (03/15/2022 – 03/28/2022)

Over the last two weeks, we saw that KELA published a report on ransomware operators’ overall trends and movements over 2021. The cybersecurity firm says that the number of...

InfoSec Articles (02/28/2022 – 03/15/2022)

Over the last couple of weeks we saw On February 24, 2022, Anonymous — a global collective of hackers — announced it was launching a cyber operation against Russian...

Threat Intelligence Data Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be...

InfoSec Articles (02/14/2022 – 02/28/2022)

Over the past two weeks, we saw that Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited network devices,...

FortiSIEM Configuration Guide

Malware Patrol + FortiSIEMMalware Patrol offers (5) Enterprise* feeds formatted for integration into FortiSIEM. This allows users to combine the quality of Fortinet's SIEM...

pfSense Configuration guide

pfSense The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and it also includes third-party free...

InfoSec Articles (02/01/2022 – 02/14/2022)

Over the past two weeks, we saw "FritzFrog", a peer-to-peer (P2P) botnet, which means its command and control server is not limited to a single, centralized machine, but...

DNS Sinkholes Detect and Protect. Discovering What’s Inside Them Can Be the Key to Security

Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity requires vigilance. But...

InfoSec Articles (01/04/2022 – 01/31/2022)

Over the last two weeks, Varonis Threat Labs has observed one such RaaS provider, ALPHV (aka BlackCat ransomware), gaining traction since late 2021, actively recruiting new...

InfoSec Articles (01/04/2022 – 01/17/2022)

Over the past two weeks, we saw the operators of the SFile ransomware (aka Escal) have developed a Linux version of their malware to expand their operations. SFile...

InfoSec Articles (12/21/2021 – 01/04/2022)

Over the past two weeks, we saw that AvosLocker is a relatively new ransomware-as-a-service. The Sophos Rapid Response team has so far seen AvosLocker attacks in the...

InfoSec Articles (12/07/2021 – 12/20/2021)

Over the last two weeks, we saw the ten families of malicious samples are spreading using the Log4j2 vulnerability Now. NetLab published a blog disclosing Mirai and Muhstik...

STAY CONNECTED

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar