{
	"id": "4f2dd06d-457f-43c9-949b-49b61032e29b",
	"created_at": "2026-04-06T00:15:40.365136Z",
	"updated_at": "2026-04-10T13:12:01.355186Z",
	"deleted_at": null,
	"sha1_hash": "665163f8b801aabf15e28f4610b82771232d3552",
	"title": "Phishing Defense Powered by AI \u0026 Human Insight",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 6692583,
	"plain_text": "Phishing Defense Powered by AI \u0026 Human Insight\r\nArchived: 2026-04-05 18:25:57 UTC\r\nAI-Powered Phishing is Fast\r\nIt Never Stops Changing\r\nEven strong perimeter defenses can’t catch every phish. Cofense combines specialized AI with expert validation\r\nfor post-perimeter detection that identifies and remediates threats and strengthens organizational resilience.\r\nRequest A Demo\r\nTrusted for Faster, Smarter Phishing Threat Defense\r\nPhishing Gets Through - The Real Challenges Start After Delivery\r\nUnified Phishing Defense\r\nTurns Intelligence into Action\r\nOne connected platform that detects what others miss, accelerates remediation, and reduces risk across the post-perimeter phishing lifecycle.\r\nExplore the Platform\r\nhttps://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/\r\nPage 1 of 3\n\nThe Measurable Impact of Smarter Phishing Defense\r\nhttps://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/\r\nPage 2 of 3\n\nImprove SOC Efficiency\r\n5x ROI\r\nwith fully managed program\r\nwith fully managed program\r\nExpose Unknown Threats\r\n70%\r\nof attacks identified from global network\r\nFewer Misses through Collective Intelligence.\r\nRemediate Faster\r\n8 minutes\r\nto process and remediate\r\nMinutes to Analyze. Seconds to Remove.\r\nMitigate Future Threats\r\n26%\r\nhigher employee resilience\r\nReal Phish Drive Lasting Behavior Change.\r\nTrusted by Enterprise Security Teams\r\nCase Study\r\nE-Book\r\nROI Calculator\r\nSource: https://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/\r\nhttps://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/"
	],
	"report_names": [
		"kutaki-malware-bypasses-gateways-steal-users-credentials"
	],
	"threat_actors": [],
	"ts_created_at": 1775434540,
	"ts_updated_at": 1775826721,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/665163f8b801aabf15e28f4610b82771232d3552.pdf",
		"text": "https://archive.orkl.eu/665163f8b801aabf15e28f4610b82771232d3552.txt",
		"img": "https://archive.orkl.eu/665163f8b801aabf15e28f4610b82771232d3552.jpg"
	}
}