Currenly it only monitor and control file I/O and processesHow many hooks(system wide) this does?
-sepik
Sorry but I don't really understand what you mean@LeMinhThanh
What are you going to give back to the VT-community? Dan from Voodooshield only used the VT-results and was cut off last year. Lucky for Dan was that he developed a cloud whitelist to compensate for this missing executable evaluation. I can remember in 2019 one of the new AI based antivirus solutions was also cut off from VT-results.
Regards L
cruelsister said:In short, a company must have a native (their own) scanner that has been approved by the AMTSO BEFORE they can leech VT data to add to their scanners
I'm not a big fan of any AV, but it always seemed outrageous to me that any person could set up a Cloud with a VT API hook and create your own Malware-B-Gone product without any actual research department, whereas those AV-companies spend millions on new detections
Wow, thanks for your infomation!Virus Total changed their policy in 2016 (link), so anti-malware programs could not use the results of VT (and benefit of the hard work of all the AV-companies on VT). In the past VT-blocked AI based AV-products to use their VT-scanner. In 2020 VoodooShield also was not allowed to use their API any more. As soon as your program gets some audience reach and you would launch a commercial version, you are probably no longer allowed to use VT.
took the liberty of changing a few words in CS explanation to make it friendlier to read for you