32, 929, 245 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Con ...
Overview The Replay Protected Memory Block (RPMB) protocol found in several storage specifications ...
Overview Macrium Reflect contains a privilege escalation vulnerability due to the use of an OPENSS ...
Dark Reading
Dark Reading
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations. ...
Indian national will serve 20 years in prison for running a large call center fraud operation. ...
SPONSORED: Sophos' principal research scientist discusses the fast-changing attacker behaviors of 2020 and how security pros ...
VirusTotal
VirusTotal
 We welcome the BitDefender Falx scanner to VirusTotal. This engine is specialized in Android and reinforces the participation of Bitdefender tha ...
TL;DR: VirusTotal allows you to search for similar files according to different orthogonal notions (structure, visual layout, icons, execution behavio ...
The concept of similarity is pretty straightforward: are two files similar? There are many ways to figure it out. That's why different similarity algo ...