36, 813, 017 Unique Data Points

Trending Research Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains
Top Domains Being Researched on Counter Attack
Active Researchers
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
US CERT
Overview Lambda Layers in third party TensorFlow-based Keras models allow attackers to inject arbi ...
Overview Various programming languages lack proper validation mechanisms for commands and in some ...
Overview A new cross-privilege Spectre v2 vulnerability that impacts modern CPU architectures supp ...
Dark Reading
Dark Reading
VirusTotal
VirusTotal
VirusTotal’s Threat Landscape can be a valuable source of operational and tactical threat intelligence for CTI teams, for instance helping us find ...
The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in ta ...
The MITRE framework helps all defenders speak the same language regarding attackers' modus operandi. VirusTotal provides multiple data points where ...