IoT Asset Discovery
IoT Vulnerability Detection
IoT Network Access Control
Become A Partner
Events & Webinars
28, 372, 972 Unique Data Points
Past 24 Hours
Top IP Addresses
Top IP Addresses Being Researched on Counter Attack
Top Domains Being Researched on Counter Attack
Researchers Using Counter Attack Over Time
US CERT Vulnerabilities
VU#918987: Bluetooth BR/EDR supported devices are vulnerable to key negotiation attacks
Bluetooth is a short-range wireless technology based off of a core specification that defines six di ...
VU#605641: HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion
The Security Considerations section of RFC7540 discusses some of the considerations needed for HTTP/ ...
VU#489481: Cylance Antivirus Products Susceptible to Concatenation Bypass
Cylance PROTECT is an endpoint protection system. It contains an antivirus functionality that uses a ...
80 Charged in Massive BEC Operation Bust
A group of mostly Nigerian nationals attempted to steal $46 million through business email compromise and romance scams, the ...
Capital One Breach: What Security Teams Can Do Now
Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks. ...
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Microsoft remains the favorite brand to spoof in phishing campaigns, but more attackers are impersonating Facebook. ...
VirusTotal MultiSandbox += SNDBOX
Today, VirusTotal is happy to welcome SNDBOX to the Multi-sandbox project. SNDBOX is a cloud based automated malware analysis platform. SNDBOX advance ...
VirusTotal, Chronicle and Google Cloud
It's been more than seven years since Google acquired VirusTotal, and more than one year since we moved to Chronicle. Today we have another update: Ch ...
VirusTotal += Segasec URL scanner
We have added Segasec to the assortment of URL scanners on VirusTotal. You can find the results when scanning a URL at https://www.virustotal.com/gui ...