IoT Security Products
Events & Webinars
Free Tools – Exploitable IoT Scanner
Become A Partner
Schedule a Demo
33, 684, 417 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#434904: Dnsmasq is vulnerable to memory corruption and cache poisoning
Overview Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a sec ...
VU#843464: SolarWinds Orion API authentication bypass allows remote command execution
Overview The SolarWinds Orion API is vulnerable to authentication bypass that could allow a remote ...
VU#429301: Veritas Backup Exec is vulnerable to privilege escalation due to OPENSSLDIR location
Overview Veritas Backup Exec contains a privilege escalation vulnerability due to the use of an OP ...
Ransomware Disrupts Operations at Packaging Giant WestRock
Incident is another reminder of how vulnerable OT environments are to attack, security experts say. ...
Pay-or-Get-Breached Ransomware Schemes Take Off
In 2020, ransomware attackers moved quickly to adopt so-called "double extortion" schemes, with more than 550 incidents in th ...
North Korean Attackers Target Security Researchers via Social Media: Google
Google TAG warns the infosec community of unsolicited requests from individuals seeking collaboration on vulnerability resear ...
Building towards the richest and most interconnected malware ecosystem
Investigations on malicious activity usually start with small pieces of a puzzle we don't know how big and complex it will be. Analysts will nev ...
VirusTotal Multisandbox += Sangfor ZSand
VirusTotal multisandbox project welcomes Sangfor ZSand. The ZSand currently focuses on PE files，with extensions to other popular file types li ...
VirusTotal += BitDefender Falx
We welcome the BitDefender Falx scanner to VirusTotal. This engine is specialized in Android and reinforces the participation of Bitdefender tha ...