#onpatrol4malware Blog
Malware Patrol insights, research, and updates
Stay informed with the latest in cyber threat intelligence, malware trends, and industry insights. The Malware Patrol Blog offers expert analysis, practical advice, and updates on tools and tactics to help you strengthen your defenses and stay ahead of evolving threats.
Best Practices to Protect Against Ransomware
? Everyone wants to know how to protect against ransomware - 2021 is the year of ransomware! The Colonial Pipeline attack shutdown a major oil distribution line and held it for ransom. Kaseya,...
Malware Patrol Data Offered in ThreatBlockr Marketplace
? Updated on 2022.03.22 - Bandura Cyber now is ThreatBlockr.Press Release  St. Petersburg, FL, July 28, 2021 -- Malware Patrol, the veteran threat intelligence company, announced...
DoH! Not so great to the Enterprise
?? What Is DNS over HTTPS (DoH) and Why It Matters for SecurityDoH, or DNS over HTTPS (RFC 8484), is a relatively new protocol that provides increased privacy and security. It does this by...
Newly Registered Domains Related to COVID-19
The current outbreak of the COVID-19 created a perfect scenario for all sorts of scammers to monetize through fear, false promises and fraud. Since the beginning of March, tens of...
Threat Intelligence: Essential For Your Cyber Defenses
Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top 5 business concern...
Palo Alto MineMeld Configuration Guide
Palo Alto MineMeld is an extensible Threat Intelligence processing framework and the multi-tool of threat indicator feeds. MineMeld can be used to collect, aggregate, and filter...
Tips for Establishing Your Security Program
(And How the Cyber Insurance Industry May Help You for Free) I won’t keep you waiting. Before you get too excited about that free assist from the cyber insurance industry, let me be clear: it...
Command and Control Servers: Fundamentals
Command and Control Servers (C2s) are the brains of the malware operation. Learn more about how they work in our blog.
Phishing’s Next Wave: AI-Enabled Tactics for Attackers and Cybersecurity Pros
Cybercrime steals an estimated $600 billion from the global economy every year. In the next several years we can expect that number to reach well into the trillions.Phishing and spear phishing...
Phishing: The Tide Is Still Coming In
In cybersecurity the familiar is dangerous. Because of this, we must qualify what we “already know†and refresh our knowledge. Without this attention, cracks in the system grow until huge...
Reputation Jacking: Unknown Threats on Well-Known Sites
Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.
SpamAssassin Configuration Guide
Malware Patrol provides block lists compatible with SpamAssassin. "Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to...
Why choose Malware Patrol over a free DNS protection service?
Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair,...
Accessing threat data on AWS S3 buckets
Malware Patrol provides some of its threat data feeds via Amazon / AWS S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)"....
Malware Patrol – Protection Against Crypto Mining Abuse
Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for...
DNS RPZ Firewall Configuration Guide
BIND is the world's most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ) enables DNS administrators to selectively...
Cisco ASA FirePOWER Configuration Guide
“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated...
Spoofed DDoS Attacks and BCP 38
The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...
DDoS: What is a Reflection and Amplification Attack?
?? Â Updated on 06/13/2022 DDoS - What is it? A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious actor seeks to disrupt normal traffic of a...
Role of DGAs (Domain Generation Algorithms) in Malware and Ransomware Campaigns
The vast majority of active malware and ransomware families include some sort of communication with command and control servers (C&Cs). This connection allows them to receive...
pfBlockerNG Configuration Guide
? Using Malware Patrol Block Lists with pfBlockerNG for Enhanced FilteringMalware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that...