
Piece of malware X was detected as malicious by 48 vendors out of 57 (Example analysis here) And this API can of course be automated.
#CYLANCE ANTIVIRUS AV TEST DOWNLOAD#
VT’s massive store of malware is available to download via an API for those paying for its subscription package.So for you and me, VT gives you a very good feel of how many vendors’ basic detectors would handle a piece of malware. These engines (57 integrated partners as at ) are the core function within each vendor’s full AV product, but due to VT utilising them within its command line scanner, VT does not take advantage of more advanced features such as behavioural analysis or real time cloud interaction. VT has a web front end that allows Joe Public to upload and search for pieces of malware and see how many AV engines would detect them, if at all.VT itself is effectively three services in one place. On 4th May 2016, Google’s VirusTotal (aka VT) online malware detection service posted to their blog a revision to their policies.

I also give my perspective as a technical specialist on Next Gen AV and my opinion on what is really going on here.

This blog post gives a summary of what happened and the official statements from the vendors pushed into the firing line. If a so called “bomb just dropped in endpoint security” then it must have been a dud. We’ve seen an avalanche of mud slinging, hearsay and all out attack on various new vendors by the traditional AV club, and it was all based on a myth. The last seven days has seen the AV industry once again shoot itself in the foot.
