[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fx2-n27hN6u0NWzB-fjQXBSxFB8v8s_i5UIJ4TSkNJOc":3},{"article":4,"iocs":47},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":27,"category":28,"article_tags":31},"ddb56eea-99f1-4b24-a48c-4e55b30fda88","Most of you have probably already seen the reports about the DAEMON Tools supply chain compromise...","most-of-you-have-probably-already-seen-the-reports-about-the-daemon-tools-supply-bb0779","Most of you have probably already seen the reports about the DAEMON Tools supply chain compromise\n\nAccording to Kaspersky, the campaign has been active since April 8 and affected victims in more than 100 countries\n\nOn our side, we took the published indicators and turned them https:\u002F\u002Ft.co\u002FAeD7x1UdGe https:\u002F\u002Ft.co\u002Fghsy5ay60T","A supply chain compromise targeting DAEMON Tools has been active since April 8, impacting victims in over 100 countries according to Kaspersky. Security researchers have extracted and published indicators of compromise (IOCs) from the campaign. The attack leverages the legitimate DAEMON Tools distribution channel to deliver malicious payloads to a global audience.","DAEMON Tools supply chain compromise active since April 8 affecting victims across 100+ countries.",null,"https:\u002F\u002Fx.com\u002Fnextronresearch\u002Fstatus\u002F2051761743798452704","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHlSBjNXAAM8x9y.jpg","2026-05-05T20:31:34+00:00","2026-05-05T21:00:10.754538+00:00",7,[18,21,24],{"name":19,"type":20},"DAEMON Tools","product",{"name":22,"type":23},"Kaspersky","vendor",{"name":25,"type":26},"DAEMON Tools Supply Chain Compromise","campaign","26b0b636-0e31-4db1-bffb-61bdf9f20a58",{"id":27,"icon":11,"name":29,"slug":30},"Supply Chain","supply-chain",[32,37,42],{"category":33},{"id":34,"icon":11,"name":35,"slug":36},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":38},{"id":39,"icon":11,"name":40,"slug":41},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",{"category":43},{"id":44,"icon":11,"name":45,"slug":46},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]