Trusted Design

Pulse一覧

Title Created Indicators
South American telecommunication providers targeted with three new malware implants 2026-04-04 72
Weaponizing the Protectors: TeamPCPs Multi-Stage Supply Chain Attack on Security Infrastructure 2026-04-04 2
Axios NPM Distribution Compromised in Supply Chain Attack 2026-04-04 7
Axios Front-End Library npm Supply Chain Poisoning Alert 2026-04-04 6
Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns 2026-04-04 16
From Inbox to Intrusion: Multi‑Stage Remcos RAT and C2‑Delivered Payloads in Network 2026-04-04 12
Inside the Axios supply chain compromise - one RAT to rule them all 2026-04-04 8
Latest Xloader Obfuscation Methods and Network Protocol 2026-04-04 9
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack 2026-04-04 17
Stranger Strings: Yurei Ransomware Operator Toolkit Exposed 2026-04-04 6
Cisco Talos: Qilin EDR killer infection chain 2026-04-04 13
Blurred Lines: AdTech Abuse Delivers Browser Hijackers Through the Microsoft Store 2026-04-04 105
Securing the Supply Chain: How SentinelOne's AI EDR Stops the ... 2026-04-04 12
A Technique-Based Approach to Hunting Web-Delivered Malware 2026-04-04 15
DPRK-Related Campaigns with LNK and GitHub C2 2026-04-04 5
AI Infrastructure Supply Chain Poisoning Alert 2026-03-27 6
AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion 2026-03-27 10
Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka 2026-03-27 0
The Latest PlugX Variant Executed by STATICPLUGIN 2026-03-27 14
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites 2026-03-22 19
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) 2026-03-22 0
Arkanix Stealer targets a variety of data, offers a MaaS referral program 2026-03-21 33
(Don't) TrustConnect: It's a RAT in an RMM hat 2026-03-21 23
Invitation to Trouble: The Rise of Calendar Phishing Attacks 2026-03-21 12
The Curious Case of the Triton Malware Fork 2026-03-21 5
ClickFix in action: how fake captcha can encrypt an entire company 2026-03-21 20
CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours 2026-03-20 0
Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets 2026-03-20 4
VoidStealer: Debugging Chrome to Steal Its Secrets 2026-03-20 3
An Overview of The Gentlemen's TTPs 2026-03-20 0
Critical Vulnerabilities in Ivanti EPMM Exploited 2026-03-20 0
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors 2026-03-20 0
Technical Analysis of SnappyClient 2026-03-20 5
How to uncover a Horabot campaign and detect this malware 2026-03-20 37
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect 2026-03-20 15
New Malware Targets Users of Cobra DocGuard Software 2026-03-20 7
DTO malware that takes notes 2026-03-20 7
How ClickFix Opens the Door to Stealthy StealC Information Stealer 2026-03-20 11
Operation GhostMail: Russian APT Exploits Zimbra XSS to Target Ukraine Government 2026-03-17 0
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2 2026-03-17 29
Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations 2026-03-14 8
Nation-State Actors Exploit Notepad++ Supply Chain 2026-03-14 39
AI/LLM-Generated Malware Used to Exploit React2Shell 2026-03-12 0
BeatBanker: both banker and miner for Android 2026-03-10 16
Quiz sites trick users into enabling unwanted browser notifications 2026-03-10 16
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors 2026-03-09 2
InstallFix: How attackers are weaponizing malvertized install guides 2026-03-09 25
Remote Access Delivered Through Fake Zoom and Google Meet Calls 2026-03-09 29
Mobile spyware campaign impersonates Israel's Red Alert rocket warning system 2026-03-09 7
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets 2026-03-09 6