As I work in an incident response role, my daily task is to mitigate the security alert and perform the analysis part. When any alerts come, I check the IPs from where they originate and the location. If any URLs or domains are involved, I check when those domains were created. I also check what the final URL of a redirected URL is. All these tasks are performed using VirusTotal.
Cyber Security Senior Consultant at Inspira Enterprise
Real User
Top 5
2024-10-14T08:34:00Z
Oct 14, 2024
I am working in GRC, and sometimes VirusTotal is just a tool. We mostly use VirusTotal for pinging suspicious IP addresses. Whenever there is a suspicious IP, we put it inside VirusTotal for further details. We use it to get details about IP originations or when we need to check IPs, URLs, or hashes for their legitimacy.
Advisor Adtech/Martech/API product/project Engineering at Fiserv
Real User
Top 10
2024-05-10T07:09:52Z
May 10, 2024
We usually use it to explore and monitor malicious campaigns and other such activities. We use the IOCs and YARA rules to implement and monitor attacks, and to detect any suspicious or malicious activities. We also analyze files privately with VirusTotal's private scanning feature, without sharing them with anyone. We have been using other platforms as well, but we feel that VirusTotal adds more value to our services, especially since I mostly deal with retail and FinTech. For retail and FinTech, VirusTotal is mandatory, and we have to be more productive with our website and applications. So, VirusTotal is a great online service that helps marketers and business people analyze suspicious files, and detect malware and malicious content using antivirus engines and site scanners.
I use VirusTotal to examine and manually investigate data leaks, compromised information, and malware. If some malware is targeted at our region, I try to find that with the hash in IoC and create alerts. For example, if some attacker creates ransomware and targets Turkey's financial sector, I write a query for that. After that, Google will show me the hash related to my research. After that, I add this hash to create alerts if a customer gets mail attacks related to this cache.
Anti-malware solutions are software programs that are designed to protect devices from malware. Malware is a broad term that encompasses any software that is designed to harm a computer system. This includes viruses, worms, trojans, ransomware, and other malicious programs.
As I work in an incident response role, my daily task is to mitigate the security alert and perform the analysis part. When any alerts come, I check the IPs from where they originate and the location. If any URLs or domains are involved, I check when those domains were created. I also check what the final URL of a redirected URL is. All these tasks are performed using VirusTotal.
I am working in GRC, and sometimes VirusTotal is just a tool. We mostly use VirusTotal for pinging suspicious IP addresses. Whenever there is a suspicious IP, we put it inside VirusTotal for further details. We use it to get details about IP originations or when we need to check IPs, URLs, or hashes for their legitimacy.
We usually use it to explore and monitor malicious campaigns and other such activities. We use the IOCs and YARA rules to implement and monitor attacks, and to detect any suspicious or malicious activities. We also analyze files privately with VirusTotal's private scanning feature, without sharing them with anyone. We have been using other platforms as well, but we feel that VirusTotal adds more value to our services, especially since I mostly deal with retail and FinTech. For retail and FinTech, VirusTotal is mandatory, and we have to be more productive with our website and applications. So, VirusTotal is a great online service that helps marketers and business people analyze suspicious files, and detect malware and malicious content using antivirus engines and site scanners.
I use VirusTotal to examine and manually investigate data leaks, compromised information, and malware. If some malware is targeted at our region, I try to find that with the hash in IoC and create alerts. For example, if some attacker creates ransomware and targets Turkey's financial sector, I write a query for that. After that, Google will show me the hash related to my research. After that, I add this hash to create alerts if a customer gets mail attacks related to this cache.
Our primary use case is for information regarding malware and analyzing our samples once we are found in a cybersecurity forensic case.