36, 838, 983 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview A use-after-free vulnerability in lighttpd in versions 1.4.50 and earlier permits a remot ...
Overview A vulnerability in the RADIUS protocol allows an attacker allows an attacker to forge an ...
Overview The Intelligent Platform Management Interface (IPMI) implementations in multiple manufact ...
Dark Reading
Dark Reading
VirusTotal
VirusTotal
Hi Everyone, We can hardly believe it, but VirusTotal is turning 20 on June 1st! As we sit down to write this, we’re filled with a mix of pride ...
When tracking adversaries, we commonly focus on the malware they employ in the final stages of the kill chain and infrastructure, often overlooking sa ...
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher's toolbox. Throughout this tim ...