BUSINESS PROTECT

Protection Against Ransomware and Malware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

 

  • Our database is updated constantly by crawlers in the cloud
  • Each indicator is verified daily
  • DNS names are resolved 4-6 times a day
  • Newly discovered URLs are processed within an hour.
protection against ransomware

USE CASES

There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details

m

CONTENTS

– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.

 

FORMATS

– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy

b

FEATURES

– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (08/30/21 – 09/13/21)

In the first 2 weeks of September, we saw the LockFile is a new ransomware family that emerged in July 2021 following the discovery in April 2021 of the ProxyShell...

InfoSec Articles (08/16/21 – 08/30/21)

In the last 2 weeks of August, we saw campaigns use a multitude of infection components to deliver two widely popular commodity malware and remote access trojans (RATs):...

Protect Against Ransomware Using Best Practices

Everyone wants to know how to protect against ransomware - 2021 is the year of ransomware! The Colonial Pipeline attack shutdown a major oil distribution line and held it...

InfoSec Articles (08/02/21 – 08/16/21)

In this first half of August, we saw that during Cyble’s routine Open-Source Intelligence (OSINT) research, we came across a malware posted by a researcher on Twitter. Also,...

InfoSec Articles (07/19/21 – 08/02/21)

Over the past two weeks, we saw that the Government sanctioned cyber-surveillance is back in the news, following an exposé that reveals how commercial malware is being used...

Malware Patrol data offered through Bandura Cyber Threat Intelligence Marketplace

      Press Release   St. Petersburg, FL, July 28, 2021 -- Malware Patrol, the veteran threat intelligence company, announced today that they now offer data...

InfoSec Articles (07/05/21 – 07/19/21)

Over the past 2 weeks, we saw Threat actors behind the infamous TrickBot malware have been linked to a new ransomware strain named “Diavol,”. Also, a new malware that...

InfoSec Articles (06/21/21 – 07/05/21)

Malware patrol selected some relevant news over the past 2 weeks. Microsoft has confirmed signing a malicious driver being distributed within gaming environments....

InfoSec Articles (06/07/21 – 06/21/21)

In the last two weeks of June, we saw the Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network...

Three Types of Cyber Threat Intelligence

Cyber threat intelligence (CTI) is one of the main pillars of cybersecurity strategies. Although it is not the answer to all cybersecurity problems, it is a very important...

InfoSec Articles (05/24/21 – 06/07/21)

At the end of March and beginning of June, we saw the Evolution of the JSWorm ransomware, the ransomware threat landscape has been gradually changing. We have been witness...

InfoSec Articles (05/10/21 – 05/24/21)

In the past two weeks of May, we noticed that the whole world is susceptible to cyber-attacks and even banks. Bizarro is another family of banking Trojans originating in...

InfoSec Articles (04/26/21 – 05/10/21)

At the end of April and the first week of March, we realized that cyberattacks do not rest, recently the Cybereason Nocturnus team responded to several incident response...

InfoSec Articles (04/12/21 – 04/26/21)

In the second half of April, we noticed a growing wave of cyber attacks Microsoft threat analysts have been tracking activity where contact forms published on websites are...

InfoSec Articles (03/29/21 – 04/12/21)

In this first half of April, we noticed that cyber threats are spreading all over the world and involve major investigations. This new threat, which we’ve named Janeleiro,...

STAY CONNECTED

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar