35, 860, 822 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview A security feature bypass vulnerability exists in signed 3rd party UEFI bootloaders that ...
Overview Versions 1.1.5 and earlier of the mu HTTP deamon (muhttpd) are vulnerable to path travers ...
Overview SMA Technologies OpCon UNIX agent adds the same SSH key on every installation and subsequ ...
Dark Reading
Dark Reading
The curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats an ...
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation. ...
The stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers and RATs at a rapid, w ...
VirusTotal
VirusTotal
CVE-2022-30190 (aka Follina) is a 0-day vulnerability that was disclosed on Twitter last May 27th by the nao_sec Cyber Security Research Team. Accordi ...
Today, we are happy to announce that in addition to Google's URL scanning service (Safe Browsing), which has been integrated with VirusTotal, Google i ...
Continuing our initiative of sharing VirusTotal’s visibility to help researchers, security practitioners and the general public better understand th ...