{
	"id": "258b51b9-2b2c-43f1-b15a-5d43375ab20b",
	"created_at": "2026-04-06T00:11:27.442425Z",
	"updated_at": "2026-04-10T03:21:58.687236Z",
	"deleted_at": null,
	"sha1_hash": "68c867e7ec0dc27c43c356a21c56db1cb79b27f3",
	"title": "404",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 910397,
	"plain_text": "404\r\nArchived: 2026-04-05 13:54:28 UTC\r\nThis page doesn't exist,\r\nbut your adversaries do\r\n404\r\nThis page doesn't exist,\r\nbut your adversaries do\r\nPopular Resources\r\nhttps://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities\r\nPage 1 of 4\n\nCrowdStrike 2026 Global Threat Report\r\nReport\r\nCrowdStrike 2026 Global Threat Report\r\nDownload the CrowdStrike 2026 Global Threat Report and discover the notable themes, trends, and events across\r\nthe cyber threat landscape.\r\nhttps://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities\r\nPage 2 of 4\n\nState of AI in Cybersecurity\r\nReport\r\nState of AI in Cybersecurity\r\nCrowdStrike surveyed over 1,000 security professionals about GenAI. See what they had to say.\r\nhttps://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities\r\nPage 3 of 4\n\n2025 Top Cybersecurity Trends\r\nCrowdCast Series\r\n2025 Top Cybersecurity Trends\r\nEliminating security silos across AI, identity, SIEM, and cloud.\r\nSource: https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities\r\nhttps://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities"
	],
	"report_names": [
		"how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities"
	],
	"threat_actors": [],
	"ts_created_at": 1775434287,
	"ts_updated_at": 1775791318,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/68c867e7ec0dc27c43c356a21c56db1cb79b27f3.pdf",
		"text": "https://archive.orkl.eu/68c867e7ec0dc27c43c356a21c56db1cb79b27f3.txt",
		"img": "https://archive.orkl.eu/68c867e7ec0dc27c43c356a21c56db1cb79b27f3.jpg"
	}
}