36, 201, 034 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview There are six new vulnerabilities in the latest release of Netatalk (3.1.12) that could a ...
Overview Multiple Unified Extensible Firmware Interface (UEFI) implementations are vulnerable to c ...
Overview Two buffer overflow vulnerabilities were discovered in OpenSSL versions 3.0.0 through 3.0 ...
Dark Reading
Dark Reading
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud. ...
Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including inte ...
The supply chain attack is piggybacking off an earlier breach to deploy new wiper malware. ...
VirusTotal
VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in ...
 A few weeks ago we stumbled upon a suspicious Android sample from a tweet from @malwrhunterteam which was only detected by four antivirus engine ...
 VirusTotal was born with the idea of community in mind - an ecosystem where everybody contributes and benefits. This helped grow our product aro ...