#Onpatrol4malware Blog
Industry News, Updates, and Press Releases
InfoSec Articles (02/27/24 – 03/12/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (02/13/24 – 02/27/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (01/30/24 – 02/13/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (01/16/24 – 01/30/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (01/02/24 – 01/16/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (12/19/23 – 01/02/24)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (12/05/23 – 12/19/23)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (11/28/23 – 12/05/23)
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (11/21/23 – 11/28/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (11/14/23 – 11/21/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (11/07/23 – 11/14/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (10/31/23 – 11/07/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (10/24/23 – 10/31/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
AWS Route 53 DNS Resolver Firewall
There are many security tools available, each serving a unique purpose in safeguarding your digital environment. Among them, the DNS firewall is one...
InfoSec Articles (10/17/23 – 10/24/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (10/10/23 – 10/17/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (10/03/23 – 10/10/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (09/26/23 – 10/03/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (09/19/23 – 09/26/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (09/12/23 – 09/19/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
Malware Patrol + Palo Alto Networks NGFW (PAN-OS)
Malware Patrol offers five Enterprise feeds formatted for use with Palo Alto Networks NGFW (PAN-OS). Customers choose the feed(s) that meet their...
InfoSec Articles (09/05/23 – 09/12/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/29/23 – 09/05/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/22/23 – 08/29/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/15/23 – 08/22/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (08/08/23 – 08/15/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
Honeypots: Simple Tools that Supercharge Cybersecurity
Staying ahead of malicious actors is a constant challenge. As threats continue to increase in complexity and sophistication,...
InfoSec Articles (08/01/23 – 08/08/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/25/23 – 08/01/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/18/23 – 07/25/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/11/23 – 07/18/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (07/04/23 – 07/11/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/27/23 – 07/04/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/20/23 – 06/27/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/13/23 – 06/20/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (06/06/23 – 06/13/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/30/23 – 06/06/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/23/23 – 05/30/23)
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable...
InfoSec Articles (05/09/23 – 05/23/23)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (04/25/23 – 05/09/23)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (03/28/2023 – 04/25/2023)
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with...
InfoSec Articles (03/15/2023 – 03/28/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Earth Preta's Cyberespionage Campaign...
InfoSec Articles (02/28/2023 – 03/15/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "New HiatusRAT Router Malware",...
InfoSec Articles (02/14/2023 – 02/28/2023)
Over the past two weeks, we saw the new blog from TrendMicro presenting "A deep dive into the evolution of ransomware - Part 1". Also more relevant...
InfoSec Articles (02/02/2023 – 02/14/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Researchers Uncover 700+ Malicious Open...
InfoSec Articles (01/16/2023 – 02/02/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Hackers now use Microsoft OneNote...
InfoSec Articles (01/04/2023 – 01/16/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Abuse of Telegram bots for credential...
InfoSec Articles (12/19/2022 – 01/04/2023)
Over the past two weeks, we saw the "Microsoft research uncovers new Zerobot capabilities" and also, "IcedID Botnet Distributors Abuse Google PPC to...
Finding the Best Threat Intelligence Vendor
Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing...
InfoSec Articles (12/07/2022 – 12/19/2022)
Over the past two weeks, we saw "The Twelve Frauds of Christmas - Payment Diversion Fraud" which is a type of fraud where criminals target an...
InfoSec Articles (11/22/2022 – 12/07/2022)
Over the past two weeks, we selected the cybersecurity highlights such as "Tractors vs. threat actors: How to hack a farm", "ChatGPT shows promise...
New OSINT Feeds: High Risk IPs – Risk Indicators – Tor Exit Nodes
Sharing is Caring To our industry's credit, there are many good OSINT feeds and data sharing platforms. Even better, they are relatively...
InfoSec Articles (11/08/2022 – 11/22/2022)
Over the past two weeks, we saw the ultimate Trojan horses "Containers", the ultimate Trojan horses meant to be immutable. Also, TA542, an actor...
InfoSec Articles (10/25/2022 – 11/08/2022)
Over the past two weeks, we saw Emotet botnet starts blasting malware again after 4 month break. The Emotet malware operation is again spamming...
InfoSec Articles (10/13/2022 – 10/25/2022)
Over the last two weeks we saw the new Prestige ransomware that impacts organizations in Ukraine and Poland. Also, Cisco Talos discovered a new...
InfoSec Articles (09/29/2022 – 10/13/2022)
Over the last two weeks, we saw the news article from Cisco Talos, they discovered a new remote access trojan (RAT) called MagicRAT, developed and...
InfoSec Articles (09/12/2022 – 09/29/2022)
Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat...
InfoSec Articles (08/29/2022 – 09/12/2022)
Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim...
Malware Hashes and Hash Functions
An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They...
InfoSec Articles (08/16/2022 – 08/29/2022)
Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert - cloud network bandwidth now...