Call/Text:
+1 404.260.7405
Products
Back
Email Security
IoT Security
Web Security
Cloud Logging
Resources
Back
Data Sheets
Events & Webinars
Free Tools – Exploitable IoT Scanner
Threat Intelligence
Partners
Back
Overview
Channel Partners
Technology Partners
Become A Partner
E-Rate Managed Service
Support
CloudPortal Login
Schedule a Demo
37, 159, 011 Unique Data Points
Trending Research
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#806555: A Vulnerability in UEFI Applications allows for secure boot bypass via misused NVRAM variable
Overview UEFI firmware applications DTBios and BiosFlashShell from DTResearch contain a vulnerabil ...
VU#282450: Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
Overview An out-of-bounds (OOB) read vulnerability has been identified in the Trusted Platform Mod ...
VU#211341: A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable
Overview A vulnerability in an Insyde H2O UEFI firmware application allows digital certificate inj ...
Dark Reading
VirusTotal
YARA-X 1.0.0: The Stable Release and Its Advantages
Audio version of this post, created with NotebookLM Deep Dive Your browser does not support the audio element. Short note for ever ...
What 17,845 GitHub Repos Taught Us About Malicious MCP Servers
Audio version of this post, created with NotebookLM Deep Dive Your browser does not support the audio element. Spoiler: VirusTo ...
Research that builds detections
Note: You can view the full content of the blog here. Introduction Detection engineering is becoming increasingly important in surfacing ...