Grace (@euphoricfall) 's Twitter Profile
Grace

@euphoricfall

Cofounder @pulsedive cybersecurity #threatintel | watercolorist | hyperserious board gamer | still borrows books from the public library

ID: 1159431794187493376

calendar_today08-08-2019 11:50:55

1,1K Tweet

1,1K Followers

1,1K Following

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! 

I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis
Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

Newly published: a beginner-friendly CyberChef 101 Guide blog.pulsedive.com/tool-guide-cyb… We cover how it works and how you can use it for security analysis - real-world examples and resources included.

Newly published: a beginner-friendly CyberChef 101 Guide
blog.pulsedive.com/tool-guide-cyb…

We cover how it works and how you can use it for security analysis - real-world examples and resources included.
Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

Our browser add-on for Chrome, Firefox, and Edge has a new look, fresh features, and more controls with our V3 update. Free to use and enrich from our Pulsedive Community platform. blog.pulsedive.com/update-pulsedi…

Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

🔎What's going on with Latrodectus? blog.pulsedive.com/threat-researc… Our latest research blog examines the distribution mechanisms, C2 traffic patterns, and key capabilities of Latrodectus loader.

Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

New blog published, all about phishing kits: blog.pulsedive.com/phishing-kits-… How do they work, what capabilities do they have, and most importantly - how can we better detect and protect against phishing kits?

Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

We're tracking the new DodgeBox (loader) & MoonWalk (backdoor) tools researched by the Zscaler ThreatLabz team as related threat pages in our free Community Platform. DodgeBox: pulsedive.com/threat/DodgeBox MoonWalk: pulsedive.com/threat/MoonWalk APT41: pulsedive.com/threat/APT41

We're tracking the new DodgeBox (loader) &amp; MoonWalk (backdoor) tools researched by the <a href="/Threatlabz/">Zscaler ThreatLabz</a>  team as related threat pages in our free Community Platform.

DodgeBox: pulsedive.com/threat/DodgeBox
MoonWalk: pulsedive.com/threat/MoonWalk
APT41: pulsedive.com/threat/APT41
Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

We released Pulsedive 6.3 this week to Pulsedive Community. This scanning infrastructure update benefits all users and customers with better data enrichment and performance. Details below

We released Pulsedive 6.3 this week to Pulsedive Community. This scanning infrastructure update benefits all users and customers with better data enrichment and performance.

Details below
Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

Community Resource Share: Curated Intelligence's CTI Research Guide curatedintel.org/2024/10/the-ct… Start with this guide if you're finding it difficult to consistently and appropriately perform intelligence collection for your stakeholders.

Cyber_OSINT (@cyber_o51nt) 's Twitter Profile Photo

A technical analysis reveals that the Kimsuky threat group utilizes a JavaScript dropper to exfiltrate data from compromised systems, utilizing network IOCs and establishing persistence via Windows scheduled tasks. #CyberSecurity #MalwareAnalysis blog.pulsedive.com/dissecting-the…

Pulsedive Threat Intelligence (@pulsedive) 's Twitter Profile Photo

Exploitation attempts for #React2Shell (CVE-2025-55182) have been widespread over the last week. Three resources that outline exploitation are: greynoise.io/blog/cve-2025-… esentire.com/security-advis… huntress.com/blog/peerbligh… Recommendation: Deploy patches as soon as possible