{
	"id": "f2897d2c-19c6-4c04-9776-e3f854a60366",
	"created_at": "2026-04-06T00:17:49.992325Z",
	"updated_at": "2026-04-10T13:12:53.852653Z",
	"deleted_at": null,
	"sha1_hash": "4eb735db75b5def0a994f6eec43f3a73b60f33ec",
	"title": "Cyber Attacks: Types, Threats \u0026 Prevention Strategies | Fidelis Security",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28841,
	"plain_text": "Cyber Attacks: Types, Threats \u0026 Prevention Strategies | Fidelis\r\nSecurity\r\nPublished: 2026-03-30 · Archived: 2026-04-02 10:57:06 UTC\r\nSee Fidelis Security platforms in action. Learn how our fast scalable platforms\r\nprovide full visibility, deep insights, and rapid response to help security teams\r\nworldwide protect, detect, respond, and neutralize against advanced cyber\r\nadversaries.\r\nSource: https://www.fidelissecurity.com/threatgeek/archive/introducing-hi-zor-rat/\r\nhttps://www.fidelissecurity.com/threatgeek/archive/introducing-hi-zor-rat/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.fidelissecurity.com/threatgeek/archive/introducing-hi-zor-rat/"
	],
	"report_names": [
		"introducing-hi-zor-rat"
	],
	"threat_actors": [],
	"ts_created_at": 1775434669,
	"ts_updated_at": 1775826773,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4eb735db75b5def0a994f6eec43f3a73b60f33ec.pdf",
		"text": "https://archive.orkl.eu/4eb735db75b5def0a994f6eec43f3a73b60f33ec.txt",
		"img": "https://archive.orkl.eu/4eb735db75b5def0a994f6eec43f3a73b60f33ec.jpg"
	}
}