Batch scans of multiple suspicious files and tailored malware research for incident response: With the free tool vt-cli, VirusTotal follows your command.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect ...
Vulnerabilities in Anthropic’s Claude Code tool could have allowed attackers to silently gain control of a developer’s computer.
Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade ...
Sample files for Azul are kept in a Simple Storage Service (S3) compatible binary large object (blob) store, and processed ...
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET ...
Crims typically gain initial access via generic keys that open the ATM face, and then infect the machine with malware, either ...
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow.
A new Android malware was found to be pre-installed on some budget Android phones and tablets by security researchers.
Kaspersky researchers say Android tablets from some brands left the factory with hidden firmware backdoor malware already ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.