33, 931, 956 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview MySQL for Windows contains a privilege escalation vulnerability due to the use of an OPEN ...
Overview Pulse Connect Secure (PCS) gateway contains a vulnerability that can allow an unauthentic ...
Overview Atlassian Bitbucket on Windows fails to properly set ACLs, which can allow an unprivilege ...
Dark Reading
Dark Reading
Three zero-day vulnerabilities helped an attacker install a backdoor, access files and emails, and move laterally into a targ ...
Ransomware gets the headlines, but business paid out $1.8 billion last year to resolve BEC issues, according to an FBI report ...
Threat actors like attacking the technology because they provide a convenient entry point to enterprise networks. ...
VirusTotal
VirusTotal
 Nowadays defenders have at their disposal a big amount of data describing how attackers proceed in their malicious campaigns, including TTPs (Te ...
It's been a year since we launched our VirusTotal plugin for IDA Pro, followed by SentinelOne’s amazing contribution to the community with their Vir ...
 Investigations on malicious activity usually start with small pieces of a puzzle we don't know how big and complex it will be. Analysts will nev ...