Trusted Design

Pulse一覧

Title Created Indicators
Hack-for-Hire Campaign Targets Journalists Across MENA Region 2026-04-09 0
The long road to your crypto: ClipBanker and its marathon infection chain 2026-04-09 12
Stealer Campaign Impacting SLTT macOS Users 2026-04-09 17
ClickFix Malware Uses macOS Script Editor to Deliver Atomic Stealer 2026-04-08 5
New Lua-based malware LucidRook observed in targeted attacks against Taiwanese organizations 2026-04-08 22
APT28 exploit routers to enable DNS hijacking operations 2026-04-08 0
Bogus website fakes virus scan, installs Venom Stealer instead 2026-04-08 3
Ringing in Chaos: How TeamPCP Weaponized the Telnyx Python SDK 2026-04-08 47
Detections for the Axios supply chain compromise 2026-04-07 24
TA416 resumes European government espionage campaigns 2026-04-07 256
Unit42: Understanding Current Threats to Kubernetes Environments 2026-04-07 0
Storm-1175 focuses gaze on vulnerable web-facing assets in high ... 2026-04-06 0
Seqrite: Advisory: Middle East Conflict & Cyber Escalation 2026-04-06 1
South American telecommunication providers targeted with three new malware implants 2026-04-04 72
Weaponizing the Protectors: TeamPCPs Multi-Stage Supply Chain Attack on Security Infrastructure 2026-04-04 2
Axios NPM Distribution Compromised in Supply Chain Attack 2026-04-04 7
Axios Front-End Library npm Supply Chain Poisoning Alert 2026-04-04 6
Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns 2026-04-04 16
From Inbox to Intrusion: Multi‑Stage Remcos RAT and C2‑Delivered Payloads in Network 2026-04-04 12
Inside the Axios supply chain compromise - one RAT to rule them all 2026-04-04 8
Latest Xloader Obfuscation Methods and Network Protocol 2026-04-04 9
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack 2026-04-04 17
Stranger Strings: Yurei Ransomware Operator Toolkit Exposed 2026-04-04 6
Cisco Talos: Qilin EDR killer infection chain 2026-04-04 13
Blurred Lines: AdTech Abuse Delivers Browser Hijackers Through the Microsoft Store 2026-04-04 105
Securing the Supply Chain: How SentinelOne's AI EDR Stops the ... 2026-04-04 12
A Technique-Based Approach to Hunting Web-Delivered Malware 2026-04-04 15
DPRK-Related Campaigns with LNK and GitHub C2 2026-04-04 5
AI Infrastructure Supply Chain Poisoning Alert 2026-03-27 6
AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion 2026-03-27 10
Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka 2026-03-27 0
The Latest PlugX Variant Executed by STATICPLUGIN 2026-03-27 14
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites 2026-03-22 19
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) 2026-03-22 0
Arkanix Stealer targets a variety of data, offers a MaaS referral program 2026-03-21 33
(Don't) TrustConnect: It's a RAT in an RMM hat 2026-03-21 23
Invitation to Trouble: The Rise of Calendar Phishing Attacks 2026-03-21 12
The Curious Case of the Triton Malware Fork 2026-03-21 5
ClickFix in action: how fake captcha can encrypt an entire company 2026-03-21 20
CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours 2026-03-20 0
Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets 2026-03-20 4
VoidStealer: Debugging Chrome to Steal Its Secrets 2026-03-20 3
An Overview of The Gentlemen's TTPs 2026-03-20 0
Critical Vulnerabilities in Ivanti EPMM Exploited 2026-03-20 0
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors 2026-03-20 0
Technical Analysis of SnappyClient 2026-03-20 5
How to uncover a Horabot campaign and detect this malware 2026-03-20 37
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect 2026-03-20 15
New Malware Targets Users of Cobra DocGuard Software 2026-03-20 7
DTO malware that takes notes 2026-03-20 7