Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect package offers highly reliable feeds of ransomware and malware URLs. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software – no API required – and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

protection against ransomware


There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

– Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers

– Prevent the exfiltration of sensitive data and intellectual property from infected machines

– Detect malicious content hosted on your networks and servers

– Improve incident response and forensic capabilities by providing your teams with meaningful information about threats

– Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details



– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall.



– ClamAV Virus DB

– pfSense / pfBlockerNG

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy




Data Feeds:

– Free 7-day trial

– Hourly updates

– Unlimited downloads

Subscription Options:

– Unlimited-use commercial license

– Monthly or 1-year subscriptions

Learn More

Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (01/22/20 – 02/05/20)

Entering into the second month of the year, there's more information about the various groups that are using the Golden Chicken Malware-as-a-Service. In addition, there's a...

Why Commercial Threat Intelligence Beats OSINT

Picture this: you’re in need of a new suit. You see that your favorite store is giving away designer suits for free and the pictures look fantastic. But digging into the...

InfoSec Articles (01/07/20 – 01/21/20)

Articles from the last couple of weeks reveal news about cyber threats targeting the electric utility industry and hackers boring into the gas company industry. And with...

Threat Intelligence: Essential For Your Cyber Defenses

Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top...

InfoSec Articles (12/23/19 – 01/06/20)

Off to an active start in 2020, threat groups are being quite agressive. Read articles about their attacks and several others in our industry article picks for the first of...

InfoSec Articles (12/08/19 – 12/22/19)

Just a few weeks into the holiday season and Ryuk ransomware, among others, are making the news. Read articles about this menace and several others in our picks from the...

Infosec Articles (11/23/19 – 12/07/19)

Even with low usage rates, new exploit kits have been found targeting Internet Explorer, says Malwarebytes in their fall report. Secure List's article about Q3 spam and...

Infosec Articles (11/8/19 – 11/22/19)

Ransomware takes the spotlight this time showing up targeting Windows users, production servers and, specifically, drives commonly associated with removable devices and...

Infosec Articles (10/24/19 – 11/7/19)

Android malware and adware, along with mobile espionage made headlines during the last two weeks. No shortage of variety in malicious behavior, there are also articles...

Infosec Articles (10/9/19 – 10/23/19)

There's a new Mirai variant and, big surprise, Android applications are taking more permissions than they are granted. For Linux users, there's a new ransomware family...

Infosec Articles (9/24/19 – 10/8/19)

Our selection of the most recent infosec articles from around the web, including write ups about both the Masad and Arcane stealer, all accompanied by a possible link...

Infosec Articles (9/9/19 – 9/23/19)

Read our hand-picked selection of the latest security articles in which botnets and RATs make frequent appearances. Despite the changes in the industry earlier this year...

Infosec Articles (8/25/19 – 9/8/19)

Read some of the most interesting and useful infosec articles from the last two weeks, in particular a couple about the newcomer Nemty ransomware. The NCSC published a...

Infosec Articles (8/11/19 – 8/24/19)

Our selection of the most recent infosec articles from around the web, including a vulnerability, a malware and a phishing attack all directed at Microsoft users. Sucuri...

Infosec Articles (7/28/19 – 8/10/19)

Our handpicked selection of the most recent infosec articles from around the web, including vulnerabilities found in Siemens and WhatsApp. The ACSC published an informative...


Sign up for our newsletter to receive occasional updates and cybersecurity news.
Newsletter - Sidebar