Actionable Threat Intel (V) – Autogenerated Livehunt rules for IoC tracking
As we previously discussed, YARA Netloc uncovers a whole new dimension for hunting and monitoring by extending YARA support to network infrastructure. All VirusTotal users have already access to different resources, including templates, a GitHub repository, and the official documentation to quickly get started on writing network YARA rules. You can also find excellent external […] more…
VirusTotal Malware Trends Report: Emerging Formats and Delivery Techniques
We just released a new edition of our “VirusTotal Malware Trends Report” series, where we want to share VirusTotal’s visibility to help researchers, security practitioners and the general public better understand the nature of malicious attacks, this time focusing on “Emerging Formats and Delivery Techniques”. Here are some of the main ideas presented there: Email […] more…
Actionable Threat Intel (IV) – YARA beyond files: extending rules to network IoCs
We are extremely excited to introduce YARA Netloc, a powerful new hunting feature that extends YARA supported entities from traditional files to network infrastructure, including domains, URLs and IP addresses. This opens endless possibilities and brings your hunting to a whole new level. Let’s get started! Creating Network rules YARA Netloc is based on extended […] more…
VirusTotal += Crowdsourced AI
We are pleased to announce the launch of Crowdsourced AI, a new initiative from VirusTotal, dedicated to leveraging the power of AI in tandem with community contributions. Spearheading this endeavor, Hispasec brings to the table an AI solution designed to analyze Microsoft document formats, particularly those containing macros, such as Word, Excel, and PowerPoint files. […] more…
Actionable Threat Intel (III) – Introducing the definitive YARA editor
One of VirusTotal’s biggest strengths is its Hunting capabilities using YARA rules. In addition to matching all files against a big set of crowdsourced YARA rules, it also allows users to create their own detection and classification rules. YARA was originally intended to support file-based rules. VirusTotal’s “vt” module extended YARA’s capabilities with file’s metadata […] more…
Apple’s cutting-edge Vision Pro doesn’t need iPhone sales to succeed
Let’s get something out of the way right at the beginning: We already know Apple’s Vision Pro device consists of a bundle of bleeding-edge technologies competitors can’t easily emulate. How do we know this? Because supply chain reports claim the lenses used in these devices are hard to source. Ergo, they are hard to manufacture. […] more…
Threat hunting converting SIGMA to YARA
Malware threat hunting is the process of proactively searching for malicious activity. It is a critical part of any organization’s security posture, as it can help to identify and mitigate threats that may have otherwise gone undetected. Sigma rules and YARA rules are two powerful tools that can be used for detection and malware threat […] more…
VirusTotal += Docguard
We are excited to announce our integration with DOCGuard for the analysis of Office documents, PDFs and other file types as a behavioral analysis engine. This document analysis collaboration will allow the community to get the another opinion on the scanned documents. In their own words: DOCGuard is a malware analysis service, whose main use case is […] more…
Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…
AI boosts Code Language and File Format identification on VirusTotal
We are pleased to announce that VirusTotal has improved the identification of programming languages and file formats through the implementation of Generative AI (artificial intelligence). Historically, automating these tasks has been quite challenging, especially when it comes to certain scripting and plain text file formats. However, with the aid of Generative AI, we have expanded […] more…
Handy Outlook keyboard shortcuts for Windows and Mac
Outlook’s Ribbon interface is great for finding everything you might ever want to do in the email, contacts, and calendaring program — particularly things you don’t do frequently, like using the mail merge feature. But if you’re looking to do common tasks fast, you’ll find keyboard shortcuts far more useful. Why bother to lift your […] more…
VirusTotal += Mandiant Permhash: Unearthing adversary infrastructure and toolkits by leveraging permissions similarity
Last Monday our colleagues over at Mandiant rolled out Permhash. In their own words, Permhash is an extensible framework to hash the declared permissions applied to Chromium-based browser extensions and APKs allowing for clustering, hunting, and pivoting similar to import hashing and rich header hashing. We are excited to announce that we have been working […] more…
VT Code Insight: Updates and Q&A on Purpose, Challenges, and Evolution
Following the announcement of VirusTotal Code Insight at the RSA Conference 2023, we’ve been thrilled by the overwhelmingly positive response from the cybersecurity community. As enthusiasm grows, we’ve been flooded with inquiries from those keen to discover more about Code Insight. To address these questions, we’ve put together a Q&A covering popular topics, including news […] more…
Arm reportedly set to make prototype chip ahead of IPO
UK-based semiconductor design company Arm is reportedly looking to team up with manufacturing partners to develop its own prototype semiconductor, targeted for use in mobile devices, laptops and other electronics. The prototype chips are meant to showcase advances that the company is making, in an attempt to increase the company’s value and attract new customers […] more…
APT43: An investigation into the North Korean group’s cybercrime operations
Introduction As recently reported by our Mandiant’s colleagues, APT43 is a threat actor believed to be associated with North Korea. APT43’s main targets include governmental institutions, research groups, think tanks, business services, and the manufacturing sector, with most victims located in the United States and South Korea. The group uses a variety of techniques and […] more…
Government-backed digital money to represent $213B in payments by 2030
The global value of central bank digital currencies (CBDCs) will grow dramatically from $100 million today to $213 billion by 2030, once the virtual money gains greater adoption for domestic payments, according to new data from Juniper Research. By 2030, 92% of the total value transacted through CBDCs around the world will be paid domestically, as […] more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy