+1.813.321.0987

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection...

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about “popular” and “important” domains being present in our block lists and data feeds, and that this must be a mistake....

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

ClamAV Configuration Guide

ClamAV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats. Malware Patrol provides signatures that are compatible with ClamAV software. You can follow these simple steps to configure your ClamAV instance and...

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind9 to work with Malware Patrol’s data. Getting Started Malware Patrol provides a zone file compatible with Bind9. Its usage as a DNSBL (DNS black list) denies access to domains...