37, 160, 185 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview An unauthenticated HTTP request can enable telnet which may lead to remote code execution ...
Overview PCI Express Integrity and Data Encryption (PCIe IDE), introduced in the PCIe 6.0 standard ...
Overview Duc, an open-source disk management tool, contains a stack-based buffer overflow vulnerab ...
Dark Reading
Dark Reading
VirusTotal
VirusTotal
We are excited to announce the launch of Saved Searches in Google Threat Intelligence (GTI) and VirusTotal (VT), a powerful new feature designed to st ...
Introduction We have recently started a new blog series called #VTPRACTITIONERS. This series aims to share with the community what other practitioner ...
TL;DR: We ran our new AI-based Mach-O analysis pipeline in production, no metadata, no prior detections, just raw Apple binaries. On Oct 18, 2025, out ...