Trusted Design

Pulse一覧

Title Created Indicators
How ClickFix Opens the Door to Stealthy StealC Information Stealer 2026-03-20 11
Operation GhostMail: Russian APT Exploits Zimbra XSS to Target Ukraine Government 2026-03-17 0
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2 2026-03-17 29
Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations 2026-03-14 8
Nation-State Actors Exploit Notepad++ Supply Chain 2026-03-14 39
AI/LLM-Generated Malware Used to Exploit React2Shell 2026-03-12 0
BeatBanker: both banker and miner for Android 2026-03-10 16
Quiz sites trick users into enabling unwanted browser notifications 2026-03-10 16
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors 2026-03-09 2
InstallFix: How attackers are weaponizing malvertized install guides 2026-03-09 25
Remote Access Delivered Through Fake Zoom and Google Meet Calls 2026-03-09 29
Mobile spyware campaign impersonates Israel's Red Alert rocket warning system 2026-03-09 7
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets 2026-03-09 6
Middle East Conflict Fuels Opportunistic Cyber Attacks 2026-03-09 36
Unmasking an Attack Chain of MuddyWater 2026-03-09 7
New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering 2026-03-09 3
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in Southeast Asia 2026-03-06 0
Fake Tech Support Delivers Havoc Command & Control 2026-03-05 22
MuddyWater Exposed: Inside an Iranian APT operation 2026-03-05 2
Using SSL Certificates and Graph Theory to Uncover Threat Actors 2026-03-05 324
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale 2026-03-05 18
Iranian APT Infrastructure in Focus: Mapping State-Aligned Clusters During Geopolitical Escalation 2026-03-05 19
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit 2026-03-05 41
Infostealers without borders: macOS, Python stealers, and platform abuse 2026-03-04 59
Infrastructure of Interest: Medium Confidence Phishing 2026-03-04 717
Infrastructure of Interest: Medium Confidence Command And Control 2026-03-04 2107
Infrastructure of Interest: Medium Confidence FastFlux 2026-03-04 620
Breaking Down the Role of Cyber Operations Taken in the Iran Crisis 2026-03-04 0
Malicious Packagist Packages Disguised as Laravel Utilities Deploy Encrypted RAT 2026-03-04 3
Signed malware impersonating workplace apps deploys RMM backdoors 2026-03-04 49
Silver Dragon Targets Organizations in Southeast Asia and Europe 2026-03-04 49
Quick, You Need Assistance! 2026-03-04 11
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit 2026-03-04 4
Web-Based Indirect Prompt Injection Observed in the Wild: Fooling AI Agents 2026-03-04 20
RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command 2026-03-04 5
SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh 2026-03-04 43
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran 2026-03-04 2
OAuth redirection abuse enables phishing and malware delivery 2026-03-04 4
Dust Specter APT Targets Government Officials in Iraq 2026-03-04 46
Funnull Resurfaces: Exposing RingH23 Arsenal and MacCMS Supply Chain Attacks 2026-03-04 145
DynoWiper update: Technical analysis 2026-03-01 20
Interlock Ransomware: New Techniques, Same Old Tricks 2026-03-01 0
Threat Intelligence Dossier: TOXICSNAKE 2026-03-01 7
Approaching Cyclone: Vortex Werewolf Attacks Russia 2026-02-28 64
Malicious Go 'crypto' Module Steals Passwords and Deploys Rekoobe Backdoor 2026-02-27 16
Henry IV, Hotspur, Hal, and hallucinations 2026-02-27 15
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1 2026-02-27 13
Abusing .arpa: The TLD That Isn't Supposed to Host Anything 2026-02-27 13
Botnet Trojan delivered through ClickFix and EtherHiding 2026-02-27 25
New malicious npm package 'ambar-src' targets developers with open source malware 2026-02-27 18