Events & Webinars
Free Tools – Exploitable IoT Scanner
Become A Partner
Schedule a Demo
35, 860, 822 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#309662: Signed third party UEFI bootloaders are vulnerable to Secure Boot bypass
Overview A security feature bypass vulnerability exists in signed 3rd party UEFI bootloaders that ...
VU#495801: muhttpd versions 1.1.5 and earlier are vulnerable to path traversal
Overview Versions 1.1.5 and earlier of the mu HTTP deamon (muhttpd) are vulnerable to path travers ...
VU#142546: SMA Technologies OpCon UNIX agent adds the same SSH key to all installations
Overview SMA Technologies OpCon UNIX agent adds the same SSH key on every installation and subsequ ...
Google Cloud Adds Curated Detection to Chronicle
The curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats an ...
Google Chrome Zero-Day Found Exploited in the Wild
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation. ...
'DarkTortilla' Malware Wraps in Sophistication for High-Volume RAT Infections
The stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers and RATs at a rapid, w ...
CVE-2022-30190 (aka Follina) is a 0-day vulnerability that was disclosed on Twitter last May 27th by the nao_sec Cyber Security Research Team. Accordi ...
VirusTotal += Google
Today, we are happy to announce that in addition to Google's URL scanning service (Safe Browsing), which has been integrated with VirusTotal, Google i ...
Deception at a scale
Continuing our initiative of sharing VirusTotal’s visibility to help researchers, security practitioners and the general public better understand th ...