Protection Against Ransomware and Malware

Small Business Protection

Our Business Protect package offers targeted protection against ransomware and malware infections. The data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. It is formatted for ease of use, compatible with the most common security platforms and software and:

Our database is updated constantly by crawlers in the cloud

Each indicator is verified daily

DNS names are resolved 4-6 times a day

Newly discovered URLs are processed within an hour.

protection against ransomware



There are many ways to use our data to protect your assets, employees and networks, as well as your customers:

Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers

Prevent the exfiltration of sensitive data and intellectual property from infected machines

Detect malicious content hosted on your networks and servers

Improve incident response and forensic capabilities by providing your teams with meaningful information about threats

Grow your business by providing industry-leading threat data as a premium service to your customers.

Package Details



– Malware & ransomware URL data for rolling 9-month period, to maximize active threat coverage.

– Hashes to verify the integrity of the downloaded data feed.

– For an additional fee, you can add our DNS RPZ Firewall. Annual subscriptions only.



– ClamAV Virus DB

– pfBlockerNG / pfSense

– Postfix MTA

– SpamAssassin

– SquidGuard Block List

– Squid Web Proxy



– Free 7-day trial

– Hourly updates

– Unlimited downloads

– Whitelisting tool (for customization)

– Full-use commercial license

– Monthly or 1-year subscriptions


Learn More

Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

InfoSec Articles (09/12/2022 – 09/29/2022)

Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat ransomware gangs are now...

Malware Hashes and Hash Functions

An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help...

InfoSec Articles (08/16/2022 – 08/29/2022)

Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert - cloud network bandwidth now stolen through...

InfoSec Articles (07/19/2022 – 08/01/2022)

Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new Incident Response Report...

InfoSec Articles (07/04/2022 – 07/19/2022)

Over the past two weeks, we saw the news about the infected WordPress site that revealed a malicious C&C script. Also, a new Android malware family on the Google Play...

InfoSec Articles (06/20/2022 – 07/04/2022)

Over the last two weeks, we saw that relevant article "Dark Web Price Index 2022" - "As the global health crisis ground on for a second year, many of the trends in Dark Web...

MISP Project – A free & robust open source threat intelligence platform

The MISP project is a free open source threat intelligence platform (TIP) that stores, analyzes, and shares information about malware. It is co-financed by the...

InfoSec Articles (06/06/2022 – 06/20/2022)

Over the last two weeks, we saw that a few months back, researchers discovered a new, undetected malware that acts in this parasitic nature affecting Linux® operating...

InfoSec Articles (05/23/2022 – 06/06/2022)

Over the last two weeks, we saw the Clipminer malware gang stole $1.7M by hijacking crypto payments. According to researchers from Symantec, a Broadcom company, Clipminer is...

InfoSec Articles (05/09/2022 – 05/23/2022)

Over the past two weeks, we saw The CrowdStrike Falcon OverWatch™ threat hunting team has uncovered a new and highly sophisticated Internet Information Services (IIS)...

InfoSec Articles (04/25/2022 – 05/09/2022)

Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling...

InfoSec Articles (04/11/2022 – 04/25/2022)

Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement regarding their...

InfoSec Articles (03/28/2022 – 04/11/2022)

Over the last two weeks, we saw that "from the beginning of 2022, we have dealt with six different strains of wiper malware targeting Ukraine: WhisperKill, WhisperGate,...

InfoSec Articles (03/15/2022 – 03/28/2022)

Over the last two weeks, we saw that KELA published a report on ransomware operators’ overall trends and movements over 2021. The cybersecurity firm says that the number of...

InfoSec Articles (02/28/2022 – 03/15/2022)

Over the last couple of weeks we saw On February 24, 2022, Anonymous — a global collective of hackers — announced it was launching a cyber operation against Russian...


Sign up for our newsletter to receive occasional updates and cybersecurity news.
Newsletter - Sidebar