#Onpatrol4malware Blog
Industry News, Updates, and Press Releases
SpamAssassin Configuration Guide
Malware Patrol provides block lists compatible with SpamAssassin. "Apache SpamAssassin is the #1 Open Source anti-spam platform...
Why choose Malware Patrol over a free DNS protection service?
Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS...
Accessing threat data on AWS S3 buckets
Malware Patrol provides some of its threat data feeds via Amazon / AWS S3 buckets. Among the feeds are the "Malware Samples (Binaries)"...
Malware Patrol – Protection Against Crypto Mining Abuse
Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a...
DNS RPZ Firewall Configuration Guide
BIND is the world's most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ)...
Cisco ASA FirePOWER Configuration Guide
“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and...
Spoofed DDoS Attacks and BCP 38
The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts...
DDoS: What is a Reflection and Amplification Attack?
 Updated on 06/13/2022 DDoS - What is it? A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious...
Popular Domains Hosting Malware
Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about...
Role of DGAs (Domain Generation Algorithms) in Malware and Ransomware Campaigns
The vast majority of active malware and ransomware families include some sort of communication with command and control servers...
pfBlockerNG Configuration Guide
Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block...
Comparing Protection Mechanisms
In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.
ClamAV Configuration Guide
ClamAV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats. Malware Patrol provides signatures...
Squid3 Web Proxy Configuration Guide
Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and...
BIND9 Configuration Guide
Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind9 to work with Malware Patrol's data. Getting Started Malware...