Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
YARA-X 1.11.0 Released With a New Hash Function Warnings

YARA-X 1.11.0 Released With a New Hash Function Warnings

Posted on January 12, 2026January 12, 2026 By CWS

VirusTotal has launched YARA-X model 1.11.0, introducing an vital new function designed to enhance rule reliability and scale back false negatives in malware detection.

The newest replace introduces hash-function warnings that assist safety researchers catch widespread errors when writing YARA detection guidelines.

YARA-X is a malware detection engine extensively utilized by cybersecurity professionals to establish malicious information.

When writing YARA guidelines, analysts usually must match particular cryptographic hashes, both the entire file hash or parts of file content material.

Nonetheless, these operations are basically string comparisons reasonably than direct hash validations.

The hash features in YARA-X, akin to hash. sha256, return hexadecimal strings representing the calculated hash worth.

These strings are then in contrast in opposition to literal hash values specified within the rule. This course of works accurately, however introduces alternatives for human error.

The brand new warning system addresses two prevalent points that plague YARA rule improvement:

Typos and formatting errors: Safety analysts continuously make easy errors when getting into hash values.

Including an unintentional area, mistyping characters, or introducing formatting inconsistencies prevents the rule from matching meant targets. Beforehand, these errors would silently fail with out notification.

Hash algorithm mismatches: One other widespread downside happens when builders by accident combine hash varieties.

For instance, offering a SHA1 hash string when a SHA256 comparability is meant. The rule would by no means match as a result of the string lengths and codecs don’t align correctly.

Extra Launch Enhancements

Past the hash perform warnings, YARA-X 1.11.0 consists of a number of vital enhancements throughout a number of modules and APIs.

FeatureDescriptionHash Operate WarningsFlags hash errors and mismatches in YARA rulesDEX & Mach-O UpdatesImproved Android and macOS file detectionCRX PermhashAdds Chrome extension evaluation supportPython & C API UpdatesNew imports methodology and console loggingStricter ValidationCatches extra rule errorsGIL Optimization & FixesImproves stability and scan efficiency

The DEX module implementation permits detection capabilities for Android DEX information. In distinction, the macOS module now helps parsing extra Mach-O load instructions, together with LC_LAZY_LOAD_DYLIB and LC_LOAD_UPWARD_DYLIB.

The discharge additionally strengthens the parser to implement stricter validation guidelines. It introduces new performance, such because the imports() methodology for the Python API.

The permhash function has been carried out for the CRX module, increasing Chrome extension evaluation capabilities. The replace resolves essential bugs affecting parser reliability and rule execution.

Mounted points embrace panic circumstances when evaluating booleans and dealing with invalid Unicode escape sequences.

The Python module has been optimized to stop pointless International Interpreter Lock acquisition throughout scan operations, bettering efficiency.

In keeping with GitHub advisory, YARA-X 1.11.0 is accessible on Home windows, macOS, and Linux. The discharge consists of each binary distributions and supply code, making it accessible for builders and safety groups worldwide.

This replace reinforces YARA-X’s dedication to delivering strong, user-friendly malware detection capabilities.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:1.11.0, Function, Hash, Released, Warnings, YARAX

Post navigation

Previous Post: Google Integrating Gemini With Gmail With New features
Next Post: Instagram Fixes Password Reset Vulnerability Amid User Data Leak

Related Posts

Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network Cyber Security News
North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities Cyber Security News
Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely Cyber Security News
Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects Cyber Security News
AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System Cyber Security News
Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News