33, 684, 417 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a sec ...
Overview The SolarWinds Orion API is vulnerable to authentication bypass that could allow a remote ...
Overview Veritas Backup Exec contains a privilege escalation vulnerability due to the use of an OP ...
Dark Reading
Dark Reading
Incident is another reminder of how vulnerable OT environments are to attack, security experts say. ...
In 2020, ransomware attackers moved quickly to adopt so-called "double extortion" schemes, with more than 550 incidents in th ...
Google TAG warns the infosec community of unsolicited requests from individuals seeking collaboration on vulnerability resear ...
VirusTotal
VirusTotal
 Investigations on malicious activity usually start with small pieces of a puzzle we don't know how big and complex it will be. Analysts will nev ...
VirusTotal multisandbox project welcomes Sangfor ZSand.  The ZSand currently focuses on PE files´╝îwith extensions to other popular file types li ...
 We welcome the BitDefender Falx scanner to VirusTotal. This engine is specialized in Android and reinforces the participation of Bitdefender tha ...