#onpatrol4malware Blog

Malware Patrol insights, research, and updates

?

Stay informed with the latest in cyber threat intelligence, malware trends, and industry insights. The Malware Patrol Blog offers expert analysis, practical advice, and updates on tools and tactics to help you strengthen your defenses and stay ahead of evolving threats.

 

What is Ransomware?

What is Ransomware?

Check out this recorded interview for ransomware insights, prevention strategies, and tips from Malware Patrol’s CEO.

read more
DoH! Not so great to the Enterprise

DoH! Not so great to the Enterprise

Updated on 2022.03.22 – Bandura Cyber now is ThreatBlock.Press Release St. Petersburg, FL, July 28, 2021 Malware Patrol, the veteran threat intelligence company, announced

read more
Phishing: The Tide Is Still Coming In

Phishing: The Tide Is Still Coming In

In cybersecurity the familiar is dangerous. Because of this, we must qualify what we already know and refresh our knowledge. Without this attention, cracks in the system grow until huge

read more
Reputation Jacking: Unknown Threats on Well-Known Sites

Reputation Jacking: Unknown Threats on Well-Known Sites

Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.

read more
SpamAssassin Configuration Guide

SpamAssassin Configuration Guide

?? Malware Patrol provides block lists compatible with SpamAssassin.   "Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to...

read more
Protection Against Crypto Mining Abuse

Protection Against Crypto Mining Abuse

?? Cryptocurrency mining delivered via websites, a monetization model where JavaScript or WebAssembly code runs within a victim's browser to mine cryptocurrencies, has reemerged in a...

read more

DNS RPZ Firewall Configuration Guide

????? BIND is the world's most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ) enables DNS administrators to selectively...

read more
Spoofed DDoS Attacks and BCP 38

Spoofed DDoS Attacks and BCP 38

? The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...

read more

Stay up-to-date on the latest threats and cybersecurity news with Malware Patrol’s Security Signals.

Blog Categories

Subscribe to Our Newsletter

Free OSINT Data Feeds

Risk Indicator orange, white and blue image that links to the registration page for Malware Patrol's Free OSINT Data Feeds
?