VirusTotal (@virustotal) 's Twitter Profile
VirusTotal

@virustotal

Crowdsourced Security Intelligence

ID: 145033865

linkhttp://www.virustotal.com calendar_today17-05-2010 23:53:51

368 Tweet

31,31K Followers

0 Following

VirusTotal (@virustotal) 's Twitter Profile Photo

In our new post, "Unmasking Hidden Cyberthreats with Code Insight", Bernardo Quintero discusses real-world cases where AI-powered code analysis unveils malware, phishing attempts, and more: blog.virustotal.com/2024/01/uncove…

In our new post, "Unmasking Hidden Cyberthreats with Code Insight", <a href="/bquintero/">Bernardo Quintero</a> discusses real-world cases where AI-powered code analysis unveils malware, phishing attempts, and more: blog.virustotal.com/2024/01/uncove…
VirusTotal (@virustotal) 's Twitter Profile Photo

Need to get up and running your VT Livehunt rules? Our Cheat Sheet will streamline your monitoring rule creation. All details here, by Ralcaz : blog.virustotal.com/2024/02/vt-liv…

Need to get up and running your VT Livehunt rules? Our Cheat Sheet will streamline your monitoring rule creation. All details here, by <a href="/ralcaz/">Ralcaz</a> : blog.virustotal.com/2024/02/vt-liv…
VirusTotal (@virustotal) 's Twitter Profile Photo

Harness TTPs for malware hunting! Our new blog post shows you how to leverage VirusTotal to hunt for ransomware, keyloggers & more, by leximagination : blog.virustotal.com/2024/02/follow…

Harness TTPs for malware hunting! Our new blog post shows you how to leverage VirusTotal to hunt for ransomware, keyloggers &amp; more, by <a href="/leximagination/">leximagination</a> :
blog.virustotal.com/2024/02/follow…
VirusTotal (@virustotal) 's Twitter Profile Photo

Threat actors actively leverage COM object hijacking for persistence and privilege escalation. We identified the most commonly abused COM objects and CLSIDs to help you stay safe by Joseliyo: blog.virustotal.com/2024/03/com-ob…

Threat actors actively leverage COM object hijacking for persistence and privilege escalation. We identified the most commonly abused COM objects and CLSIDs to help you stay safe by <a href="/Joseliyo_Jstnk/">Joseliyo</a>: 
blog.virustotal.com/2024/03/com-ob…
VirusTotal (@virustotal) 's Twitter Profile Photo

Threat intelligence just got easier. Use VirusTotal Threat Landscape to track threat actors & prioritize threats. Our latest blog shows how CTI teams win, by Ralcaz: blog.virustotal.com/2024/03/know-y…

Threat intelligence just got easier.  Use VirusTotal Threat Landscape to track threat actors &amp; prioritize threats. Our latest blog shows how CTI teams win, by <a href="/ralcaz/">Ralcaz</a>:  blog.virustotal.com/2024/03/know-y…
VirusTotal (@virustotal) 's Twitter Profile Photo

We are proud to partner with @TheSOCAcademy to level up your threat analysis skills. Get more details on this course from its founder, Laura, in our latest blog: blog.virustotal.com/2024/04/master…

We are proud to partner with @TheSOCAcademy to level up your threat analysis skills.  Get more details on this course from its founder, Laura, in our latest blog: blog.virustotal.com/2024/04/master…
Bernardo Quintero (@bquintero) 's Twitter Profile Photo

Excited to share my new post on how Gemini 1.5 Pro can now analyze entire binaries, offering a new & scalable approach to threat detection. Working on producing these reports at scale - stay tuned! cloud.google.com/blog/topics/th… #malwareanalysis #reverseengineering #AI

VirusTotal (@virustotal) 's Twitter Profile Photo

Discover how we use Gemini 1.5 Pro to improve malware analysis! Gemini's capability to tackle up to 1 million tokens makes a difference, not only when facing huge macros, but also providing a way to automate analysis of decompiled code, by Bernardo Quintero : blog.virustotal.com/2024/04/analyz…

Discover how we use Gemini 1.5 Pro to improve malware analysis! Gemini's capability to tackle up to 1 million tokens makes a difference, not only when facing huge macros, but also providing a way to automate analysis of decompiled code, by <a href="/bquintero/">Bernardo Quintero</a> :

blog.virustotal.com/2024/04/analyz…
VirusTotal (@virustotal) 's Twitter Profile Photo

VirusTotal's role within Google Threat Intelligence and its continued dedication to the security community. Insights from founder Bernardo Quintero: blog.virustotal.com/2024/05/virust…

VirusTotal's role within Google Threat Intelligence and its continued dedication to the security community. Insights from founder <a href="/bquintero/">Bernardo Quintero</a>: blog.virustotal.com/2024/05/virust…
VirusTotal (@virustotal) 's Twitter Profile Photo

VirusTotal's Crowdsourced AI initiative welcomes a new model by Dubin for analyzing suspicious macros in Microsoft Office files. This integration strengthens our Code Insight capabilities, by Bernardo Quintero: blog.virustotal.com/2024/05/crowds…

VirusTotal's Crowdsourced AI initiative welcomes a new model by <a href="/DubinRan/">Dubin</a> for analyzing suspicious macros in Microsoft Office files. This integration strengthens our Code Insight capabilities, by <a href="/bquintero/">Bernardo Quintero</a>: blog.virustotal.com/2024/05/crowds…
VirusTotal (@virustotal) 's Twitter Profile Photo

"YARA is dead, long live YARA-X!" 🎉 After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, security, and user experience. Dive into the details in latest blog post by Victor M. Alvarez : blog.virustotal.com/2024/05/yara-i…

"YARA is dead, long live YARA-X!" 🎉 

After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, security, and user experience. 

Dive into the details in latest blog post by <a href="/plusvic/">Victor M. Alvarez</a> : blog.virustotal.com/2024/05/yara-i…
VirusTotal (@virustotal) 's Twitter Profile Photo

Hunt APTs by their images & artifacts! New blog on tracking adversaries using delivery-stage intel by Joseliyo: blog.virustotal.com/2024/05/tracki…

Hunt APTs by their images &amp; artifacts! New blog on tracking adversaries using delivery-stage intel by <a href="/Joseliyo_Jstnk/">Joseliyo</a>: blog.virustotal.com/2024/05/tracki…
VirusTotal (@virustotal) 's Twitter Profile Photo

Improve your research skills with this tutorial on using the VirusTotal dataset, developed in partnership with SentinelLabs! Get expert tips and tricks from Joseliyo and Aleksandar Milenkoski: blog.virustotal.com/2024/08/VT-S1-…

Improve your research skills with this tutorial on using the VirusTotal dataset, developed in partnership with <a href="/LabsSentinel/">SentinelLabs</a>! Get expert tips and tricks from <a href="/Joseliyo_Jstnk/">Joseliyo</a> and <a href="/milenkowski/">Aleksandar Milenkoski</a>: blog.virustotal.com/2024/08/VT-S1-…
VirusTotal (@virustotal) 's Twitter Profile Photo

Using Google NotebookLM's innovative Audio Overview feature to make threat intelligence simple and accessible, by Bernardo Quintero blog.virustotal.com/2024/09/virust…

Using Google NotebookLM's innovative Audio Overview feature to make threat intelligence simple and accessible, by <a href="/bquintero/">Bernardo Quintero</a> 
blog.virustotal.com/2024/09/virust…
VirusTotal (@virustotal) 's Twitter Profile Photo

21 years of VirusTotal 2004: 843 viruses a week, mostly known, repetitive worms. Today: 500,000+ new and unique malware samples discovered daily. The scale and complexity have skyrocketed, but our collaborative mission remains the same. A huge thank you to our community.

21 years of VirusTotal

2004: 843 viruses a week, mostly known, repetitive worms. 

Today: 500,000+ new and unique malware samples discovered daily.

The scale and complexity have skyrocketed, but our collaborative mission remains the same. A huge thank you to our community.