Events & Webinars
Free Tools – Exploitable IoT Scanner
Become A Partner
Schedule a Demo
36, 201, 034 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#709991: Netatalk contains multiple error and memory management vulnerabilities
Overview There are six new vulnerabilities in the latest release of Netatalk (3.1.12) that could a ...
VU#434994: Multiple race conditions due to TOCTOU flaws in various UEFI Implementations
Overview Multiple Unified Extensible Firmware Interface (UEFI) implementations are vulnerable to c ...
VU#794340: OpenSSL 3.0.0 to 3.0.6 decodes some punycode email addresses in X.509 certificates improperly
Overview Two buffer overflow vulnerabilities were discovered in OpenSSL versions 3.0.0 through 3.0 ...
3 Ways Attackers Bypass Cloud Security
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud. ...
CNAPP Shines a Light Into Evolving Cloud Environments
Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including inte ...
Agrius Iranian APT Group Cuts Into Diamond Industry
The supply chain attack is piggybacking off an earlier breach to deploy new wiper malware. ...
Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in ...
From zero to Zanubis
A few weeks ago we stumbled upon a suspicious Android sample from a tweet from @malwrhunterteam which was only detected by four antivirus engine ...
Stopping Cobalt Strike with YARA
VirusTotal was born with the idea of community in mind - an ecosystem where everybody contributes and benefits. This helped grow our product aro ...