IoT Security Products
Events & Webinars
Free Tools – Exploitable IoT Scanner
Become A Partner
Schedule a Demo
32, 929, 245 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#724367: VMware Workspace ONE Access and related components are vulnerable to command injection
Overview VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Con ...
VU#231329: Replay Protected Memory Block (RPMB) protocol does not adequately defend against replay attacks
Overview The Replay Protected Memory Block (RPMB) protocol found in several storage specifications ...
VU#760767: Macrium Reflect is vulnerable to privilege escalation due to OPENSSLDIR location
Overview Macrium Reflect contains a privilege escalation vulnerability due to the use of an OPENSS ...
Inside North Korea's Rapid Evolution to Cyber Superpower
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations. ...
Call Fraud Operator Ordered to Pay $9M to Victims
Indian national will serve 20 years in prison for running a large call center fraud operation. ...
Sophos 2021 Threat Report: Navigating Cybersecurity in an Uncertain World
SPONSORED: Sophos' principal research scientist discusses the fast-changing attacker behaviors of 2020 and how security pros ...
VirusTotal += BitDefender Falx
We welcome the BitDefender Falx scanner to VirusTotal. This engine is specialized in Android and reinforces the participation of Bitdefender tha ...
Using similarity to expand context and map out threat campaigns
TL;DR: VirusTotal allows you to search for similar files according to different orthogonal notions (structure, visual layout, icons, execution behavio ...
Why is similarity so relevant when investigating attacks
The concept of similarity is pretty straightforward: are two files similar? There are many ways to figure it out. That's why different similarity algo ...