Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

YARA-X 1.11.0 Released With a New Hash Function Warnings

Posted on January 12, 2026January 12, 2026 By CWS

VirusTotal has launched YARA-X model 1.11.0, introducing an vital new function designed to enhance rule reliability and scale back false negatives in malware detection.

The newest replace introduces hash-function warnings that assist safety researchers catch widespread errors when writing YARA detection guidelines.

YARA-X is a malware detection engine extensively utilized by cybersecurity professionals to establish malicious information.

When writing YARA guidelines, analysts usually must match particular cryptographic hashes, both the entire file hash or parts of file content material.

Nonetheless, these operations are basically string comparisons reasonably than direct hash validations.

The hash features in YARA-X, akin to hash. sha256, return hexadecimal strings representing the calculated hash worth.

These strings are then in contrast in opposition to literal hash values specified within the rule. This course of works accurately, however introduces alternatives for human error.

The brand new warning system addresses two prevalent points that plague YARA rule improvement:

Typos and formatting errors: Safety analysts continuously make easy errors when getting into hash values.

Including an unintentional area, mistyping characters, or introducing formatting inconsistencies prevents the rule from matching meant targets. Beforehand, these errors would silently fail with out notification.

Hash algorithm mismatches: One other widespread downside happens when builders by accident combine hash varieties.

For instance, offering a SHA1 hash string when a SHA256 comparability is meant. The rule would by no means match as a result of the string lengths and codecs don’t align correctly.

Extra Launch Enhancements

Past the hash perform warnings, YARA-X 1.11.0 consists of a number of vital enhancements throughout a number of modules and APIs.

FeatureDescriptionHash Operate WarningsFlags hash errors and mismatches in YARA rulesDEX & Mach-O UpdatesImproved Android and macOS file detectionCRX PermhashAdds Chrome extension evaluation supportPython & C API UpdatesNew imports methodology and console loggingStricter ValidationCatches extra rule errorsGIL Optimization & FixesImproves stability and scan efficiency

The DEX module implementation permits detection capabilities for Android DEX information. In distinction, the macOS module now helps parsing extra Mach-O load instructions, together with LC_LAZY_LOAD_DYLIB and LC_LOAD_UPWARD_DYLIB.

The discharge additionally strengthens the parser to implement stricter validation guidelines. It introduces new performance, such because the imports() methodology for the Python API.

The permhash function has been carried out for the CRX module, increasing Chrome extension evaluation capabilities. The replace resolves essential bugs affecting parser reliability and rule execution.

Mounted points embrace panic circumstances when evaluating booleans and dealing with invalid Unicode escape sequences.

The Python module has been optimized to stop pointless International Interpreter Lock acquisition throughout scan operations, bettering efficiency.

In keeping with GitHub advisory, YARA-X 1.11.0 is accessible on Home windows, macOS, and Linux. The discharge consists of each binary distributions and supply code, making it accessible for builders and safety groups worldwide.

This replace reinforces YARA-X’s dedication to delivering strong, user-friendly malware detection capabilities.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:1.11.0, Function, Hash, Released, Warnings, YARAX

Post navigation

Previous Post: Google Integrating Gemini With Gmail With New features
Next Post: Instagram Fixes Password Reset Vulnerability Amid User Data Leak

Related Posts

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File Cyber Security News
Windows 11 Gets New Black Screen of Death With Auto Recovery Tool Cyber Security News
Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Cyber Security News
12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark