Pulsedive Threat Intelligence Read. Learn. Defend.
Pulsedive Blog Read. Learn. Defend.
- Albabat 2.0.0 Decoded: A Config-Driven Designby Pulsedive Threat Research on May 16, 2025 at 4:00 pm
This blog analyzes Albabat ransomware, exploring its config file, executed ransomware commands, and ransom note.
- Rilide – An Information Stealing Browser Extensionby Pulsedive Threat Research on March 21, 2025 at 11:30 am
Learn about the information stealing browser extension Rilide, its delivery methods, and intrusion chain.
- Work With Us: Technical Writerby Grace Chi on March 19, 2025 at 3:25 pm
Pulsedive is looking for a technical writer on a contract basis to create clear, concise, and user-friendly content.
- Compromised Browser Extensions – A Growing Threat Vectorby Pulsedive Threat Research on February 25, 2025 at 1:45 pm
Learn how threat actors leverage browser extensions as an attack vector, including examples for Cyberhaven and GraphQL Network Inspector.
- Assemblyline 101 – Open Source Malware Triageby Pulsedive Threat Research on January 7, 2025 at 5:16 pm
Learn how to install and use Assemblyline, the open-source malware triage tool. This 101 includes an overview, deployment walkthrough, example use case, and resources.
- 2024 In Reviewby Pulsedive Threat Research on December 30, 2024 at 1:30 pm
A rewind of the year across the threat landscape and at Pulsedive.
- Black Friday 2024by Grace Chi on November 20, 2024 at 12:50 am
This Black Friday, get 30% off Pulsedive Pro to boost your threat intelligence research and analysis flows.
- Leveraging Threat Intelligence in Security Operationsby Pulsedive Threat Research on October 29, 2024 at 12:45 pm
Explore the essential role of Cyber Threat Intelligence (CTI) in understanding and mitigating cybersecurity threats – detailing its types, processes, and effective implementation in enhancing security operations and incident response.
- Cronus: Ransomware Threatening Bodily Harmby Pulsedive Threat Research on October 17, 2024 at 1:15 pm
This technical research analyzes Cronus Ransomware. We examine how the ransomware encrypts files, establishes persistence, and deviates from other ransom notes.
- CrowdStrike BSOD Outage: What We Knowby Pulsedive Threat Research on July 30, 2024 at 4:18 pm
What we know about the CrowdStrike BSOD outage.
- Phishing Kits 101 & V3B Phishing Kitby Pulsedive Threat Research on July 25, 2024 at 5:38 pm
Phishing kits are “as-a-service” tools that help threat actors rapidly deploy phishing pages and campaigns. This blog examines key components, how they work, helpful resources, and a dive into the V3B phishing kit.
- Sharing, Compared Part 4: Where Do We Go From Here?by Grace Chi on June 18, 2024 at 4:33 pm
Quantitative and qualitative insights inform our roadmap and best practices to achieve success in CTI networking.
- Latrodectus Loaderby Pulsedive Threat Research on June 4, 2024 at 4:51 pm
This research examines the distribution mechanisms, C2 traffic patterns, and functionality of Latrodectus loader.
- Update: Pulsedive Add-Onby Grace Chi on May 29, 2024 at 12:45 pm
Pulsedive’s latest V3 update to our Chrome, Firefox, and Edge add-on include new features and improved user experience.
- Sharing, Compared Part 3: How Can We Improve?by Grace Chi on May 11, 2024 at 3:15 pm
In part 3, we examine the challenges, organizational context, and issues with methods used for cyber threat intelligence sharing.