#Onpatrol4malware Blog
Industry News, Updates, and Press Releases
InfoSec Articles (09/26/23 – 10/03/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (09/19/23 – 09/26/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (09/12/23 – 09/19/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
Malware Patrol + Palo Alto Networks NGFW (PAN-OS)
Malware Patrol offers five Enterprise feeds formatted for use with Palo Alto Networks NGFW (PAN-OS). Customers choose the feed(s) that meet their...
InfoSec Articles (09/05/23 – 09/12/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/29/23 – 09/05/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/22/23 – 08/29/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/15/23 – 08/22/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/08/23 – 08/15/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
Honeypots: Simple Tools that Supercharge Cybersecurity
Staying ahead of malicious actors is a constant challenge. As threats continue to increase in complexity and sophistication,...
InfoSec Articles (08/01/23 – 08/08/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/25/23 – 08/01/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/18/23 – 07/25/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/11/23 – 07/18/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/04/23 – 07/11/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/27/23 – 07/04/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/20/23 – 06/27/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/13/23 – 06/20/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/06/23 – 06/13/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/30/23 – 06/06/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/23/23 – 05/30/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/09/23 – 05/23/23)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (04/25/23 – 05/09/23)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (03/28/2023 – 04/25/2023)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (03/15/2023 – 03/28/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Earth Preta's Cyberespionage Campaign...
InfoSec Articles (02/28/2023 – 03/15/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "New HiatusRAT Router Malware",...
InfoSec Articles (02/14/2023 – 02/28/2023)
Over the past two weeks, we saw the new blog from TrendMicro presenting "A deep dive into the evolution of ransomware - Part 1". Also more relevant...
InfoSec Articles (02/02/2023 – 02/14/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Researchers Uncover 700+ Malicious Open...
InfoSec Articles (01/16/2023 – 02/02/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Hackers now use Microsoft OneNote...
InfoSec Articles (01/04/2023 – 01/16/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Abuse of Telegram bots for credential...
InfoSec Articles (12/19/2022 – 01/04/2023)
Over the past two weeks, we saw the "Microsoft research uncovers new Zerobot capabilities" and also, "IcedID Botnet Distributors Abuse Google PPC to...
Finding the Best Threat Intelligence Vendor
Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing...
InfoSec Articles (12/07/2022 – 12/19/2022)
Over the past two weeks, we saw "The Twelve Frauds of Christmas - Payment Diversion Fraud" which is a type of fraud where criminals target an...
InfoSec Articles (11/22/2022 – 12/07/2022)
Over the past two weeks, we selected the cybersecurity highlights such as "Tractors vs. threat actors: How to hack a farm", "ChatGPT shows promise...
New OSINT Feeds: High Risk IPs – Risk Indicators – Tor Exit Nodes
Sharing is Caring To our industry's credit, there are many good OSINT feeds and data sharing platforms. Even better, they are relatively...
InfoSec Articles (11/08/2022 – 11/22/2022)
Over the past two weeks, we saw the ultimate Trojan horses "Containers", the ultimate Trojan horses meant to be immutable. Also, TA542, an actor...
InfoSec Articles (10/25/2022 – 11/08/2022)
Over the past two weeks, we saw Emotet botnet starts blasting malware again after 4 month break. The Emotet malware operation is again spamming...
InfoSec Articles (10/13/2022 – 10/25/2022)
Over the last two weeks we saw the new Prestige ransomware that impacts organizations in Ukraine and Poland. Also, Cisco Talos discovered a new...
InfoSec Articles (09/29/2022 – 10/13/2022)
Over the last two weeks, we saw the news article from Cisco Talos, they discovered a new remote access trojan (RAT) called MagicRAT, developed and...
InfoSec Articles (09/12/2022 – 09/29/2022)
Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat...
InfoSec Articles (08/29/2022 – 09/12/2022)
Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim...
Malware Hashes and Hash Functions
An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They...
InfoSec Articles (08/16/2022 – 08/29/2022)
Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert - cloud network bandwidth now...
InfoSec Articles (08/01/2022 – 08/16/2022)
Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization....
InfoSec Articles (07/19/2022 – 08/01/2022)
Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new...
InfoSec Articles (07/04/2022 – 07/19/2022)
Over the past two weeks, we saw the news about the infected WordPress site that revealed a malicious C&C script. Also, a new Android malware...
InfoSec Articles (06/20/2022 – 07/04/2022)
Over the last two weeks, we saw that relevant article "Dark Web Price Index 2022" - "As the global health crisis ground on for a second year, many...
MISP Project – A free & robust open source threat intelligence platform
The MISP project is a free open source threat intelligence platform (TIP) that stores, analyzes, and shares information about malware.It...
InfoSec Articles (06/06/2022 – 06/20/2022)
Over the last two weeks, we saw that a few months back, researchers discovered a new, undetected malware that acts in this parasitic nature...
InfoSec Articles (05/23/2022 – 06/06/2022)
Over the last two weeks, we saw the Clipminer malware gang stole $1.7M by hijacking crypto payments. According to researchers from Symantec, a...
InfoSec Articles (05/09/2022 – 05/23/2022)
Over the past two weeks, we saw The CrowdStrike Falcon OverWatch threat hunting team has uncovered a new and highly sophisticated Internet...
InfoSec Articles (04/25/2022 – 05/09/2022)
Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable - here's what to look out for...
InfoSec Articles (04/11/2022 – 04/25/2022)
Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement...
Threat Intelligence Providers vs Threat Intelligence Platforms
In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against...
FortiSIEM Configuration Guide
Malware Patrol + FortiSIEMMalware Patrol offers (5) Enterprise* feeds formatted for integration into FortiSIEM. This allows users to combine the...
pfSense Configuration guide
pfSense The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and it also includes...
DNS Sinkholes Detect and Protect
Bots don't sleep, ransomware finds new ways to infiltrate systems and yesterday's defenses may be ineffective tomorrow. Cybersecurity...
Avoiding Black Friday Phishing Scams
Black Friday is coming and threat actors are already surfing this wave of retail insanity. Not surprisingly, phishing remains an...
MISP Configuration Guide
MISP is a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise of targeted attacks,...
Fortinet Configuration Guide
FortiGate NGFWs deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can...