#onpatrol4malware Blog
Malware Patrol insights, research, and updates
Stay informed with the latest in cyber threat intelligence, malware trends, and industry insights. The Malware Patrol Blog offers expert analysis, practical advice, and updates on tools and tactics to help you strengthen your defenses and stay ahead of evolving threats.
MCP Servers for Cybersecurity
Learn about MCP servers for cybersecurity: how they work and why they’re becoming essential for secure AI integration.
Introducing the Malware Patrol MCP Server
The Malware Patrol cybersecurity MCP server connects AI to real-world threat intel. Explore use cases and how to join the beta.
Emerging Threats Intelligence: A Curated Signal with Predictive Power
Learn how emerging threats intelligence provides early visibility into malicious infrastructure and surfaces high-risk domains early.
Newly Registered Domains: A Raw Signal with Real Value
Learn about the benefits of working with a newly registered domains feed, an invaluable early-stage threat signal.
Tor Exit Nodes: Risks, Monitoring, and Defensive Use
Tor exit nodes frequently appear in cybersecurity discussions, and for good reason. This post explains why they matter so you can decide if your security team should take a closer…
Malicious Domains: A Cybersec Foundation
Malicious domains are a foundational layer of threat intelligence and provide critical visibility into where attackers operate online.
Over 14,000 Ollama Instances Exposed to the Internet
A recent scan conducted by the Malware Patrol team revealed over 14,000 Ollama instances publicly accessible on the Internet, opening…
The Evolution of C2 Communication: Custom TCP Protocols
Discover how C2 servers are evolving with custom TCP protocols and what your team can do to detect and block them.
Tunnel Vision: Looking Out for Malicious Tunneling Use
Tunneling services have emerged as an option that allows attackers to obfuscate their activities and bypass conventional security measures. Learn more in this blog post.
AWS Route 53 DNS Resolver Firewall
This step-by-step guide shows how to integrate Malware Patrol’s Malicious Domains threat intelligence with the AWS Route 53 Resolver DNS Firewall.
Malware Patrol + Palo Alto NGFW
Use this configuration guide for integrating Malware Patrol threat intelligence feeds with your Palo Alto NGFW.
Honeypots: Simple Tools that Supercharge Cybersecurity
Explore the benefits of using honeypots for threat intelligence collection, and Malware Patrol’s CTI feed based on our global honeynet.
Finding the Best Threat Intelligence Vendor
Learn how OSINT enhances CTI and sets top threat intelligence vendors apart in a competitive cybersecurity landscape.
New OSINT Feeds: High Risk IPs – Risk Indicators – Tor Exit Nodes
Malware Patrol’s free OSINT feeds help identify Tor exit nodes and high-risk IPs to improve threat detection and blocklist strategies.
Malware Hashes and Hash Functions
An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help identify malware samples.
MISP Project – A free & robust open source threat intelligence platform
MISP supports threat intelligence sharing and correlation to strengthen cyber defenses. Learn about its features for smarter detection and response.
FortiSIEM Configuration Guide
Step-by-step FortiSIEM configuration guide for integrating external threat intelligence feeds from Malware Patrol.
pfSense Configuration guide
pfSense The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and it also includes third-party free software packages for...
DNS Sinkholes: Detect and Protect
Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity requires vigilance. But vigilance alone won’t
MISP Configuration Guide
MISP can be configured to ingest data feeds from Malware Patrol. Use this configuration guide for step-by-step instructions.
FortiGate Configuration Guide
Step-by-step FortiGate configuration guide for integrating external threat intelligence feeds from Malware Patrol.
Stay up-to-date on the latest threats and cybersecurity news with Malware Patrol’s Security Signals.