Cisco ASA FirePOWER Configuration Guide
“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated approach combines...
View ArticleDNS RPZ Firewall Configuration Guide
BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ) enables DNS administrators to selectively block name resolution...
View ArticleMalware Patrol – Protection Against Crypto Mining Abuse
Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor’s CPU for cryptocurrency...
View ArticleAccessing threat data on AWS S3 buckets
Malware Patrol provides some of its threat data feeds via Amazon / AWS S3 buckets. Among the feeds are the “Malware Samples (Binaries)” and the “Bitcoin Transactions (JSON format)”. Amazon Simple...
View ArticleWhy choose Malware Patrol over a free DNS protection service?
Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in a...
View ArticleSpamAssassin Configuration Guide
Malware Patrol provides block lists compatible with SpamAssassin. “Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to classify email and block spam...
View ArticleDNS Sinkholes Detect and Protect. Discovering What’s Inside Them Can Be the...
Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity requires vigilance. But vigilance alone won’t suffice. That’s why...
View ArticleCommand and Control Servers: Fundamentals and a Few Details
Few topics in current cybersecurity generate as much press as command and control servers (C2s). They enable the cybercrime that often affects companies and individuals far outside the IT industry. As...
View ArticlePhishing: The Tide Is Still Coming In
In cybersecurity the familiar is dangerous. Because of this, we must qualify what we “already know” and refresh our knowledge. Without this attention, cracks in the system grow until huge threats can...
View ArticleWhitelisting for Block Lists
Malware Patrol’s #1 goal is to protect customers from malware and ransomware infections. These days, this can mean blocking mainstream domains. Consequently, our customers report potential false...
View ArticleThreat Intelligence: Essential For Your Cyber Defenses
Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top 5 business concern for 79%...
View ArticleWhy Commercial Threat Intelligence Beats OSINT
Picture this: you’re in need of a new suit. You see that your favorite store is giving away designer suits for free and the pictures look fantastic. But digging into the details reveals that they’re...
View ArticleDoH! Not so great to the Enterprise
Internet DoH Border Control by Patrick Taylor DoH, or DNS over HTTPS (RFC 8484), is a relatively new protocol that provides increased privacy and security. It does this by encrypting DNS queries and...
View ArticleMalware Patrol data offered through Bandura Cyber Threat Intelligence...
Press Release St. Petersburg, FL, July 28, 2021 — Malware Patrol, the veteran threat intelligence company, announced today that they now offer data feeds through the Bandura Cyber Intelligence...
View ArticleWhat is Ransomware?
Malware Patrol’s CEO Andre Correa was recently interviewed by Dana Mantilia from Identity Protection Planning. They discussed the basics – and more – about ransomware: What is Ransomware? What...
View ArticleInfoSec Articles (10/12/21 – 10/25/2021)
Over the past two weeks, we saw New PurpleFox botnet variant uses WebSockets for C2 communication. In addition, since July 2021, malicious cyber actors have used BlackMatter ransomware to target...
View ArticleMISP Configuration Guide
MISP is a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise of targeted attacks, threat intelligence, financial fraud information, and...
View ArticleInfoSec Articles (12/21/2021 – 01-04-2022)
Over the past two weeks, we saw that AvosLocker is a relatively new ransomware-as-a-service. The Sophos Rapid Response team has so far seen AvosLocker attacks in the Americas, Middle East, and...
View ArticleThree Types of Cyber Threat Intelligence
Cyber threat intelligence (CTI) is one of the main pillars of cybersecurity strategies. Although it is not the answer to all cybersecurity problems, it is a very important tool for incident...
View ArticleDNS Sinkholes Detect and Protect. Discovering What’s Inside Them Can Be the...
Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity requires vigilance. But vigilance alone won’t suffice. That’s why...
View Article
More Pages to Explore .....