Consolidated Malware Sinkhole List
A common practice of researchers studying a piece of malware is to seize control of its malicious command and control domains, then redirect traffic to them to benign research servers for analysis and victim notification. I always highly recommend monitoring for traffic to these sinkholes – it is frequently indicative of infection. I’ve found no… Read More Consolidated Malware Sinkhole List