{
	"id": "c7cc319b-0541-43b2-90f5-6ae416a8db4e",
	"created_at": "2026-04-06T00:20:17.573874Z",
	"updated_at": "2026-04-10T03:21:55.62263Z",
	"deleted_at": null,
	"sha1_hash": "200bb0a19e3b5556c9a10c2ec279ff9363f3f706",
	"title": "Homepage",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 27706,
	"plain_text": "Homepage\r\nArchived: 2026-04-05 16:39:12 UTC\r\nOur mission is to create asymmetrical cybersecurity outcomes for our clients. We refer to our\r\nthoughtful, deliberate and disciplined approach as Digital Trust™.\r\nOffensive Capabilities\r\nOur offensive capabilities utilize a wide range of technical tradecraft to enable operational success.\r\nDefensive Capabilities\r\nOur defensive capabilities are delivered via our proprietary 24x7x365 Security Operations Center (SOC) platform,\r\nenabling continuous incident response and forensics.\r\nSource: https://www.digitrustgroup.com/agent-tesla-keylogger/\r\nhttps://www.digitrustgroup.com/agent-tesla-keylogger/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.digitrustgroup.com/agent-tesla-keylogger/"
	],
	"report_names": [
		"agent-tesla-keylogger"
	],
	"threat_actors": [],
	"ts_created_at": 1775434817,
	"ts_updated_at": 1775791315,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/200bb0a19e3b5556c9a10c2ec279ff9363f3f706.pdf",
		"text": "https://archive.orkl.eu/200bb0a19e3b5556c9a10c2ec279ff9363f3f706.txt",
		"img": "https://archive.orkl.eu/200bb0a19e3b5556c9a10c2ec279ff9363f3f706.jpg"
	}
}