#onpatrol4malware Blog

Malware Patrol insights, research, and updates 

?

Stay informed with the latest in cyber threat intelligence, malware trends, and industry insights. The Malware Patrol Blog offers expert analysis, practical advice, and updates on tools and tactics to help you strengthen your defenses and stay ahead of evolving threats.

DoH! Not so great to the Enterprise

DoH! Not so great to the Enterprise

?? What Is DNS over HTTPS (DoH) and Why It Matters for SecurityDoH, or DNS over HTTPS (RFC 8484), is a relatively new protocol that provides increased privacy and security. It does this by...

read more
Phishing: The Tide Is Still Coming In

Phishing: The Tide Is Still Coming In

In cybersecurity the familiar is dangerous. Because of this, we must qualify what we “already know” and refresh our knowledge. Without this attention, cracks in the system grow until huge...

read more
Reputation Jacking: Unknown Threats on Well-Known Sites

Reputation Jacking: Unknown Threats on Well-Known Sites

Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.

read more
SpamAssassin Configuration Guide

SpamAssassin Configuration Guide

Malware Patrol provides block lists compatible with SpamAssassin.   "Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to...

read more

DNS RPZ Firewall Configuration Guide

BIND is the world's most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ) enables DNS administrators to selectively...

read more
Cisco ASA FirePOWER Configuration Guide

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated...

read more
Spoofed DDoS Attacks and BCP 38

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...

read more
pfBlockerNG Configuration Guide

pfBlockerNG Configuration Guide

? Using Malware Patrol Block Lists with pfBlockerNG for Enhanced FilteringMalware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that...

read more
?