Technical Support

Get help, report FPs or submit suspicious URLs

Support Options

Use the form to the right for technical support inquiries. Our team will respond as quickly as possible, typically in 24-48 hours for non-urgent requests.

If you are a commercial customer, you can contact your Account Manager for priority support.

For sales/general information inquiries, visit our threat intelligence page to determine the best option for your needs. Or, schedule a chat with us.

FAQs

What is cyber threat intelligence?

Cyber threat intelligence (CTI) is the collection, analysis, and sharing of information about current and emerging cyber threats, including threat actors and their tactics, techniques, and procedures (TTPs), to help organizations understand risks and make informed decisions to prevent, detect, and respond to attacks.

Why do I sometimes see duplicate entries in the data feeds?

The most common report of duplicate entries in our data feeds is related to what appears to be repeated domains or partial URLs. While it may seem that these are duplicates, it is usually the case that there is more than one malware binary in the same directory or subdirectories. Each instance of malware on a domain has its own unique identifier (MBL_ID) because it represents a distinct URL. Therefore, each entry counts as a distinct malware sample in the data feeds.
If you find something beyond this example, please let us know.

How do you handle false positives?

We take the quality of our data very seriously. Please send reports of potential false positives to fp (at) http://malwarepatrol.net . We will investigate promptly, update our database (if necessary), and let you know the results.
Please read this before submitting a false positive report:
We often receive false positive reports about domains like docs(.)google(.)com, drive(.)google(.)com, dropbox(.)com and github(.)com. Unfortunately, these sites are frequently found to be hosting malicious software. To further complicate matters, systems like Google Docs serve files from their root directories, forcing some formats of data feeds to affect (block) the entire domain.
We understand that it is not always possible to block these mainstream websites. We offers various options to our customers depending on their subscription. See FAQ topic "Whitelisting" for more details or contact our tech support team.

 

Can I whitelist entries in my data feed?

It is common knowledge in the security industry than many well-known and frequently visited websites host malware (Google Drive, DropBox, GitHub). We understand, however, that it is not always possible to block access to these popular websites, particularly those used for work purposes. Malware Patrol has options, depending on your subscription type, to help you whitelist domains to which your users require access.
Enterprise:
Several enterprise feeds offer Cisco Umbrella top domains excluded (top 25,000 or 100,000 or 1,000,000 domains). Enterprise customers may opt to use these versions instead of the full feeds. For other Enterprise feeds we include the Cisco Umbrella domain ranking as a field to allow for whitelisting per the customer's specific needs.
Also, Enterprise feeds can be customized at no cost. This offer includes the option to remove specific domains from your feed, by Cisco Umbrella ranking or otherwise. Discuss your specific needs with your Account Manager.

How often are the feeds updated?

Each indicator of compromise in our database is verified at least once daily. This means that our systems visit each URL, for example, to make sure it is still hosting malware. DGAs and other DNS names are resolved four times per day.We update most of our Enterprise feeds hourly by adding newly discovered entries and removing deactivated threats. Customers can find the update frequency in the data feed table in their portals.

The feeds below are updated at intervals other than hourly:

Real-time updates
- Malware Samples
- Phishing Screen Shots

Every 5 minutes
- DNS RPZ Firewall

How are malware samples validated?

Our system automatically downloads suspicious samples and applies a series of tests to identify if they are likely malicious. These tests include AV checks as well as proprietary tests to determine file characteristics, like PE headers and packers. This way, we can provide customers with samples potentially not classified yet as malware by AVs.

Do I have to download the whole data feed each time?

Our data feeds contain all the data currently available, not just data from the latest update. During each update, we add new entries and remove inactive ones. Therefore, customers should consider each update of a feed as the entire data set available at that point in time. Our experience is that this strategy works better than offering differentials/updates. This avoid the situation where data is missed when a customers misses a download for some reason. We compress Enterprise data feeds to save bandwidth.

Do you provide invoices?

Yes, for commercial customers. Contact your account manager or support (@) malwarepatrol.net to receive subscription invoices.

?

From the Blog

Security Signals (08/26/25 – 09/09/25)

Welcome to your biweekly digest of curated cybersecurity intelligence. Every two weeks, we bring you expert insights and...

Security Signals (08/12/25 – 08/26/25)

Welcome to your biweekly digest of curated cybersecurity intelligence. Every two weeks, we bring you expert insights and...

Security Signals (07/29/25 – 08/12/25)

Welcome to your biweekly digest of curated cybersecurity intelligence. Every two weeks, we bring you expert insights and...

InfoSec Articles (07/01/25 – 07/15/25)

????? Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from...

Security Signals (07/15/25 – 07/29/25)

Welcome to your biweekly digest of curated cybersecurity intelligence. Every two weeks, we bring you expert insights and handpicked articles covering the latest threats, threat actor…

InfoSec Articles (06/17/25 – 07/01/25)

Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest

Tor Exit Nodes: Risks, Monitoring, and Defensive Use

Tor exit nodes frequently appear in cybersecurity discussions, and for good reason. This post explains why they matter so you can decide if your security team should take a closer…

Malicious Domains: A Cybersec Foundation

Malicious domains are a foundational layer of threat intelligence and provide critical visibility into where attackers operate online.

Over 14,000 Ollama Instances Exposed to the Internet – Serious Security Implications

A recent scan conducted by the Malware Patrol team revealed over 14,000 Ollama instances publicly accessible on the Internet, opening…

InfoSec Articles (06/03/25 – 06/17/25)

Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest

InfoSec Articles (05/20/25 – 06/03/25)

Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest

InfoSec Articles (05/06/25 – 05/20/25)

Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest

InfoSec Articles (04/22/25 – 05/06/25)

???? Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from...

InfoSec Articles (04/08/25 – 04/22/25)

?? Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from...

InfoSec Articles (03/25/25 – 04/08/25)

?? Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from...

Stay Connected

Sign up to receive updates and cybersecurity news.
?