threat intelligence Leveraging Threat Intelligence in Security Operations Explore the essential role of Cyber Threat Intelligence (CTI) in understanding and mitigating cybersecurity threats - detailing its types, processes, and effective implementation in enhancing security operations and incident response.
threat intelligence Cronus: Ransomware Threatening Bodily Harm This technical research analyzes Cronus Ransomware. We examine how the ransomware encrypts files, establishes persistence, and deviates from other ransom notes.
threat intelligence CrowdStrike BSOD Outage: What We Know What we know about the CrowdStrike BSOD outage.
threat intelligence Phishing Kits 101 & V3B Phishing Kit Phishing kits are "as-a-service" tools that help threat actors rapidly deploy phishing pages and campaigns. This blog examines key components, how they work, helpful resources, and a dive into the V3B phishing kit.
threat intelligence Sharing, Compared Part 4: Where Do We Go From Here? Quantitative and qualitative insights inform our roadmap and best practices to achieve success in CTI networking.
malware Latrodectus Loader This research examines the distribution mechanisms, C2 traffic patterns, and functionality of Latrodectus loader.
pulsedive Update: Pulsedive Add-On Pulsedive's latest V3 update to our Chrome, Firefox, and Edge add-on include new features and improved user experience.
threat intelligence Sharing, Compared Part 3: How Can We Improve? In part 3, we examine the challenges, organizational context, and issues with methods used for cyber threat intelligence sharing.
threat intelligence Sharing, Compared Part 2: Where Do We Share? In part 2 of this series, discover where practitioners share during CTI collaboration - from peer to peer trust groups to paid memberships.
threat intelligence Tool Guide: CyberChef 101 Learn how to use the versatile, open source utility CyberChef. This 101 includes an overview, operations, real-world walkthrough, and resources.
threat intelligence Sharing, Compared Part 1: How and Why Do We Connect? In the first of our four-part series, learn why practitioners prioritize human-to-human sharing and its benefits.
pulsedive Pulsedive Plan Updates Pulsedive is rolling out plan and pricing updates to Community products starting on March 11, 2024.
threat intelligence Balada Injector Dive into how Balada exploits vulnerabilities within WordPress plugins. This research blog analyzes how Balada injects malicious code and the functionality of the scripts used in the campaign.
threat intelligence CTI Networking Report 2024 "Sharing, Compared: A Study on the Changing Landscape of CTI Networking" is now available online.
pulsedive MFA Now Available for All Community Users Multi-factor authentication (MFA) is now available to all Pulsedive Community users.
threat intelligence PikaBot Rising Dive into the distribution methods and capabilities of Pikabot, a loader that has been growing in prevalence since early 2023.
pulsedive Advanced Notice: Plan and Pricing Adjustments Around March 2024, Pulsedive will be adjusting our plan offerings.
pulsedive 2023 In Review Here's our 2023 roundup of cyber threat intelligence news: key exploited vulnerabilities, ransomware, and Pulsedive updates over the last year.
pulsedive Black Friday 2023 We're excited to bring back our most popular Black Friday deal. Check out this year's promotion with details and FAQs.
threat intelligence Analyzing DarkGate Loaders This blog examines three different loader types used in recent DarkGate infections.
pulsedive Announcing: Pulsedive 6.2 Pulsedive's latest release streamlines your threat intelligence workflow with enhanced threat research, revamped TTPs, and Enterprise benefits.
pulsedive Behind the Scenes: Hiring a Threat Researcher Peek into Pulsedive's Threat Researcher hiring process from start to finish. We share tips and lessons learned for both job seekers and startups.
threat intelligence Analyzing Agniane Stealer Agniane is an emerging infostealer identified in August 2023. Dive into how Agniane collects data, evades analysis, and expands operations in this blog.
malware Identifying Mystic Stealer Control Panels Learn how to research and identify control panels for Mystic Stealer, an information stealer that appeared on underground markets in April 2023.
case study Delivering an Intelligence-Driven eSOC by doIT A rapid-fire Q&A about how and why doIT, a managed security team based in Germany, partners with Pulsedive.