Events & Webinars
Free Tools – Exploitable IoT Scanner
Become A Partner
Schedule a Demo
36, 621, 062 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#347067: Multiple BGP implementations are vulnerable to improperly formatted BGP updates
Overview Multiple BGP implementations have been identified as vulnerable to specially crafted Path ...
VU#304455: Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router
Overview An authentication bypass vulnerability exists in the N300 Wireless N VDSL2 Modem Router m ...
VU#757109: Groupnotes Inc. Videostream Mac client allows for privilege escalation to root account
Overview Groupnotes Inc. Videostream Mac client installs a LaunchDaemon that runs with root privil ...
Securing AI: What You Should Know
Securing AI within your organization starts with understanding how AI differs from traditional business tools. Google's Secur ...
How Can Your Security Team Help Developers Shift Left?
Implementing a shift-left process in cybersecurity requires pulling together people, processes, and technology. ...
Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain
The Israeli company developed highly-targeted, mobile malware that would make any APT jealous. ...
It's all about the structure! Creating YARA rules by clicking
Since we made our (extended) vt module available for LiveHunt YARA rules we understand it is not easy for analysts to keep in mind all the new potenti ...
Crowdsourced AI += NICS Lab
We are pleased to share that NICS Lab, a security research group from the Computer Science Department at the University of Malaga, is joining the Crow ...
Actionable Threat Intel (V) - Autogenerated Livehunt rules for IoC tracking
As we previously discussed, YARA Netloc uncovers a whole new dimension for hunting and monitoring by extending YARA support to network infrastructure. ...