Build a Champion SOC with VirusTotal and Palo Alto Networks Cortex XSOAR
With Palo Alto Networks’ Cortex XSOAR as your champion and VirusTotal as the sharpened blade, your SOC will decimate threats and reduce analyst strain. Together, VirusTotal and Cortex XSOAR enable your security and IT teams to discover context and solve incidents in a cost effective way. Join us next March 31st for an expert-led discussion […] more…Compliant, easy and actionable integration of VirusTotal in 3rd-party products – Welcome VT Augment
TL;DR: We are releasing an official, compliant and recommended method for displaying VirusTotal context in 3rd-party products and services, so that end-users can enjoy a single pane of glass experience when working with their tools of choice. Read the docs / See the demo (click on the VirusTotal icon next to each observable). Security analysts […] more…VirusTotal += Gridinsoft
We welcome the Gridinsoft engine to VirusTotal. In the words of the company: “Gridinsoft provides an autonomous multi-layered malware detection engine based on a powerful malware-analyzing laboratory. We combine the most relevant file inspection methods with an effective interaction of our development and analyst teams. They gather threat patterns, classifying and replenishing the database with […] more…Official VirusTotal Plugin for IDA Pro 7
ATTENTION: In order to use the content search functionality you will need to have access to VT Intelligence. If you want to jump straight ahead and install the plugin, please refer to its GitHub repository. VirusTotal is very excited to announce a beta release of a new plugin for IDA Pro v7 which integrates VT […] more…VirusTotal MultiSandbox += SNDBOX
Today, VirusTotal is happy to welcome SNDBOX to the Multi-sandbox project. SNDBOX is a cloud based automated malware analysis platform. SNDBOX advanced dynamic analysis capabilities gives additional insights and visibility intro a variety of file-types. In their own words: SNDBOX malware research platform developed by researchers for researchers and provides static, dynamic and network analysis. […] more…Snakes on a plane! (Stuffed inside a hard drive)
When we talk about worms and viruses on your hard drive, we ain’t talking ball python. Usually. TSA caught the “organic mass” in screening. more…Launching VirusTotal Monitor, a service to mitigate false positives
One of VirusTotal’s core missions is to empower our antivirus partners. By building better tools to detect and study malware, VirusTotal gets to make a dent in the security of billions of users (all those that use the products of our partners). Until now we have focused on helping the antivirus industry flag malicious files, […] more…"Fauxpersky" Credential Stealer Spreads via USB Drives
A recently discovered credential stealing malware is masquerading as Kaspersky Antivirus and spreading via infected USB drives, according to threat detection firm Cybereason. Dubbed Fauxpersky, the keylogger was written in AutoIT or AutoHotKey, which are simple tools to write small programs for various automation tasks on Windows. AHK can be used to write code to […] more…A360 Drive Abused to Deliver Adwind, Remcos, Netwire RATs
By Jaromir Horejsi (Threats Analyst) Cloud-based storage platforms have a history of cybercriminal abuse, from hosting malicious files and directly delivering malware to even making them part of a command-and-control (C&C) infrastructure. GitHub was misused this way when the Winnti group used it as a conduit for its C&C communications. We saw a similar—albeit a […] more…Autodesk’s A360 Drive Abused to Deliver Adwind, Remcos, Netwire RATs
By Jaromir Horejsi (Threats Analyst) Cloud-based storage platforms have a history of cybercriminal abuse, from hosting malicious files and directly delivering malware to even making them part of a command-and-control (C&C) infrastructure. GitHub was misused this way when the Winnti group used it as a conduit for its C&C communications. We saw a similar—albeit a […] more…VirusTotal gets a new hairdo
Being geeks in a world of executable disassemblies, shell scripts, memory dumps and other beautiful matrix like interfaces, it is no secret that at VirusTotal we have never been great artists. This said, many of you may have noticed that we have taken some time to refresh our public web site. Design is a matter […] more…Are Google and Bing Serving You Safe Search Results?
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites among their top search results. This malware (or malicious software) can include sites infected with viruses, Trojans, computer worms, and more, making it extremely important for consumers to pay close attention to what they click. […] more…1 "terrific employee" + 1 thumb drive + 6,000 lost medical records = fired!
A woman called a “terrific employee” by her boss was fired after downloading 6,000 medical records onto a USB drive that she then lost. Whose fault is it, really? Perhaps if the company had technology in place to prevent the transmission of unencrypted records onto a USB device, the lamentable event wouldn’t have happened in […] more…Think before you drink before you drive before you Facebook
After the New Year’s Eve celebrations, a drunken young man crashes his vehicle into another car. Does he stop? No. He posts about it on Facebook instead. more…Dropbox, Google Drive get in-browser security boost through BoxCryptor plugin
Here’s one for business or otherwise privacy-hungry users of Chrome: BoxCryptor has released an experimental plugin that makes it possible to encrypt and decrypt files stored in Dropbox and Google Drive without needing to fiddle around with desktop apps. Tags: Google Dropbox Security more…Malware uses Google Docs as proxy to command and control server
Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order to hide the malicious traffic. read more more…More information
- The Strange Case of the Malicious Favicon
- IT decision makers not making effective use of mapping tech
- Learning from the Disqus data breach
- Comodo Forums Hacked via Recently Disclosed vBulletin Vulnerability
- The fake factor: Seven warning signs that Facebook account is bogus
- Fortinet sues Sophos over alleged employee poaching
- BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers
- Engageli and the coming wave of pandemic-era education tools
- Cyberpunk 2077 Video Game Developer Hit by Hack Attack
- Popular download management program has hidden DDoS component, researchers say