{
	"id": "0b7b4589-e237-4857-9b9d-b8649ae0cd94",
	"created_at": "2026-04-06T00:11:24.117465Z",
	"updated_at": "2026-04-10T03:20:36.192115Z",
	"deleted_at": null,
	"sha1_hash": "8774c067c45288d5b7473b5d00d5ca0655dc4e53",
	"title": "Illusive is Now Proofpoint | Proofpoint US",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28236,
	"plain_text": "Illusive is Now Proofpoint | Proofpoint US\r\nPublished: 2023-03-24 · Archived: 2026-04-05 16:56:28 UTC\r\nIn an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the\r\nendpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally\r\nacross your cloud environments by exploiting such identities. You need an innovative and agentless identity threat\r\ndetection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s\r\nattack chain.\r\nProofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across\r\nall your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect\r\nany lateral movements in your environments and activate deception to ensure threat actors are stopped in action\r\nbefore they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern\r\nidentity risks and stop real-time identity threats in action, all in one place.\r\nSource: https://illusive.com/resources/threat-research-blog/preventing-blackmatter-ransomware-from-encryption-of-available-remote-share/\r\nhttps://illusive.com/resources/threat-research-blog/preventing-blackmatter-ransomware-from-encryption-of-available-remote-share/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://illusive.com/resources/threat-research-blog/preventing-blackmatter-ransomware-from-encryption-of-available-remote-share/"
	],
	"report_names": [
		"preventing-blackmatter-ransomware-from-encryption-of-available-remote-share"
	],
	"threat_actors": [],
	"ts_created_at": 1775434284,
	"ts_updated_at": 1775791236,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8774c067c45288d5b7473b5d00d5ca0655dc4e53.pdf",
		"text": "https://archive.orkl.eu/8774c067c45288d5b7473b5d00d5ca0655dc4e53.txt",
		"img": "https://archive.orkl.eu/8774c067c45288d5b7473b5d00d5ca0655dc4e53.jpg"
	}
}