+1.813.321.0987
Fortinet Configuration Guide

Fortinet Configuration Guide

FortiGate NGFWs deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can weave security deep into the hybrid IT architecture and build security-driven networks to achieve:Ultra-fast security,...
InfoSec Articles (10/26/2021 – 11/8/2021)

InfoSec Articles (10/26/2021 – 11/8/2021)

Over the last two weeks, we observed a new threat referred to as “SQUIRRELWAFFLE” is being spread more widely via spam campaigns, infecting systems with a new malware loader. In addition, Black Friday, one of the biggest retail spending days of the year, is fast...
InfoSec Articles (10/12/21 – 10/25/2021)

InfoSec Articles (10/12/21 – 10/25/2021)

Over the past two weeks, we saw New PurpleFox botnet variant uses WebSockets for C2 communication. In addition, since July 2021, malicious cyber actors have used BlackMatter ransomware to target multiple U.S. critical infrastructure entities, including a U.S. Food and...
Mikrotik Router Configuration

Mikrotik Router Configuration

Malware Patrol provides a Mikrotik-compatible version of our Malicious Domains and the Tor Exit Nodes data feeds. In this Mikrotik router configuration guide, you will find all the steps necessary. However, feel free to contact our support if you need any...
What is Ransomware?

What is Ransomware?

 Malware Patrol’s CEO Andre Correa was recently interviewed by Dana Mantilia from Identity Protection Planning. They discussed the basics – and more – about ransomware:What is Ransomware?What should a company do in the case of an attack?Why is paying...
InfoSec Articles (9/28/21 – 10/11/21)

InfoSec Articles (9/28/21 – 10/11/21)

Malware patrol selected some relevant cybersecurity news over the past 2 weeks. A survey of cyber investigators and antiabuse service providers to understand how ICANN’s application of the European Union’s General Data Protection Regulation (GDPR) has impacted the...