Pulsedive Threat Intelligence Read. Learn. Defend.
Pulsedive Blog Read. Learn. Defend.
- NPM Compromise: The Wrath of the Shai-Hulud Supply Chain Attackby Pulsedive Threat Research on September 25, 2025 at 3:28 pm
A walkthrough of two major NPM supply chain compromises in September 2025: the Shai-Hulud worm and cryptocurrency wallet hijacking.
- Thorium 101: Inside CISA’s Open Source Malware Analysis Platformby Pulsedive Threat Research on September 10, 2025 at 12:15 pm
CISA’s new open-source malware analysis tool Thorium is designed for customization, safety, and real-world security team workflows. This post introduces its core features and how to get started.
- Unpacking KiwiStealer: Diving into BITTER APT’s Malware for File Exfiltrationby Pulsedive Threat Research on August 13, 2025 at 4:34 pm
Learn about KiwiStealer capabilities and malware analysis of how it exfiltrates data via HTTP POST requests.
- Collection through Correlation: Operationalizing IP and Domain Indicators of Compromiseby Pulsedive Threat Research on June 30, 2025 at 2:54 pm
IP addresses and domains aren’t just for blocklists; when analyzed with the right tools, they can be operationalized to enrich alerts, support threat hunting, and uncover risk.
- Albabat 2.0.0 Decoded: A Config-Driven Designby Pulsedive Threat Research on May 16, 2025 at 4:00 pm
This blog analyzes Albabat ransomware, exploring its config file, executed ransomware commands, and ransom note.
- Rilide – An Information Stealing Browser Extensionby Pulsedive Threat Research on March 21, 2025 at 11:30 am
Learn about the information stealing browser extension Rilide, its delivery methods, and intrusion chain.
- Work With Us: Technical Writerby Grace Chi on March 19, 2025 at 3:25 pm
Pulsedive is looking for a technical writer on a contract basis to create clear, concise, and user-friendly content.
- Compromised Browser Extensions – A Growing Threat Vectorby Pulsedive Threat Research on February 25, 2025 at 1:45 pm
Learn how threat actors leverage browser extensions as an attack vector, including examples for Cyberhaven and GraphQL Network Inspector.
- Assemblyline 101 – Open Source Malware Triageby Pulsedive Threat Research on January 7, 2025 at 5:16 pm
Learn how to install and use Assemblyline, the open-source malware triage tool. This 101 includes an overview, deployment walkthrough, example use case, and resources.
- 2024 In Reviewby Pulsedive Threat Research on December 30, 2024 at 1:30 pm
A rewind of the year across the threat landscape and at Pulsedive.
- Black Friday 2024by Grace Chi on November 20, 2024 at 12:50 am
This Black Friday, get 30% off Pulsedive Pro to boost your threat intelligence research and analysis flows.
- Leveraging Threat Intelligence in Security Operationsby Pulsedive Threat Research on October 29, 2024 at 12:45 pm
Explore the essential role of Cyber Threat Intelligence (CTI) in understanding and mitigating cybersecurity threats – detailing its types, processes, and effective implementation in enhancing security operations and incident response.
- Cronus: Ransomware Threatening Bodily Harmby Pulsedive Threat Research on October 17, 2024 at 1:15 pm
This technical research analyzes Cronus Ransomware. We examine how the ransomware encrypts files, establishes persistence, and deviates from other ransom notes.
- CrowdStrike BSOD Outage: What We Knowby Pulsedive Threat Research on July 30, 2024 at 4:18 pm
What we know about the CrowdStrike BSOD outage.
- Phishing Kits 101 & V3B Phishing Kitby Pulsedive Threat Research on July 25, 2024 at 5:38 pm
Phishing kits are “as-a-service” tools that help threat actors rapidly deploy phishing pages and campaigns. This blog examines key components, how they work, helpful resources, and a dive into the V3B phishing kit.