IoT Asset Discovery
IoT Vulnerability Detection
IoT Network Access Control
Become A Partner
Events & Webinars
29, 144, 175 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#125336: Microsoft Office for Mac cannot properly disable XLM macros
XLM macros Up to and including Microsoft Excel 4.0,a macro format called XLM was available. XLM macr ...
VU#766427: Multiple D-Link routers vulnerable to remote command execution
Several D-Link routers contain CGI capability that is exposed to users as/apply_sec.cgi,and dispatch ...
VU#927237: Pulse Secure VPN contains multiple vulnerabilities
Pulse Secure released an out-of-cycle advisory along with software patches for the various affected ...
Target Seeks $74M in Data Breach Reimbursement from Insurance Company
The funds would cover some of the money Target paid to reimburse financial institutions for credit card replacement after the ...
Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats
The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network
Pipelining VT Intelligence searches and sandbox report lookups via APIv3 to automatically generate indicators of compromise
TL;DR: VirusTotal APIv3 includes an endpoint to retrieve all the dynamic analysis reports for a given file. This article showcases programmatic retri ...
VirusTotal += Bitdefender Theta
We welcome the Bitdefender Theta scanner to VirusTotal. This engine is 100% Machine Learning powered and reinforces the participation of Bitdefender t ...
Test your YARA rules against a collection of goodware before releasing them in production
The rising tide of malware threats has created an arms race in security tool accumulation, this has led to alarm fatigue in terms of noisy alerts and ...