{
	"id": "1533a60c-fc11-4d5a-b321-fb275b7fe3ad",
	"created_at": "2026-04-06T00:13:46.41112Z",
	"updated_at": "2026-04-10T03:21:18.528059Z",
	"deleted_at": null,
	"sha1_hash": "f7667b96e991d9d68d0ea4e91497191f69066be5",
	"title": "Cybersecurity Blogs \u0026 Threat Geek by Fidelis Security",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29645,
	"plain_text": "Cybersecurity Blogs \u0026 Threat Geek by Fidelis Security\r\nPublished: 2026-03-17 · Archived: 2026-04-02 11:38:53 UTC\r\nSee what’s changing in attack surface analysis for 2026. EASM, CTEM, identity\r\nLearn best practices for threat detection in hybrid cloud environments and how\r\nExplore Fidelis CNAPP features, cloud native data protection, and unified visibility that\r\nLearn how endpoint deception technology improves deception endpoint coverage, detects attacks early,\r\nLearn how living-off-the-land attacks evade traditional tools in OT environments and how\r\nLearn how CNAPP supports continuous cloud native data protection, improves cloud native\r\nLearn why packet-level visibility remains essential for cloud forensics investigations, cloud network\r\nLearn proven XDR integration best practices to improve threat detection, reduce false\r\nSee how CNAPP helps detect, prevent, and fix cloud misconfigurations across AWS,\r\nExplore how Fidelis Network Deception improves threat visibility, integrates with security tools,\r\nUnderstand how to align DevSecOps practices with runtime protection using CWPP to\r\nA practical guide to responding after an Active Directory compromise. Learn containment,\r\nSource: https://www.fidelissecurity.com/threatgeek/threat-intelligence/turbo-twist-two-64-bit-derusbi-strains-converge\r\nhttps://www.fidelissecurity.com/threatgeek/threat-intelligence/turbo-twist-two-64-bit-derusbi-strains-converge\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.fidelissecurity.com/threatgeek/threat-intelligence/turbo-twist-two-64-bit-derusbi-strains-converge"
	],
	"report_names": [
		"turbo-twist-two-64-bit-derusbi-strains-converge"
	],
	"threat_actors": [],
	"ts_created_at": 1775434426,
	"ts_updated_at": 1775791278,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f7667b96e991d9d68d0ea4e91497191f69066be5.pdf",
		"text": "https://archive.orkl.eu/f7667b96e991d9d68d0ea4e91497191f69066be5.txt",
		"img": "https://archive.orkl.eu/f7667b96e991d9d68d0ea4e91497191f69066be5.jpg"
	}
}