{"id":109,"date":"2026-05-14T03:27:05","date_gmt":"2026-05-14T03:27:05","guid":{"rendered":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/"},"modified":"2026-05-14T03:27:05","modified_gmt":"2026-05-14T03:27:05","slug":"threatinfo-daily-digest-2026-05-14","status":"publish","type":"post","link":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/","title":{"rendered":"ThreatInfo Detection Digest: May 14, 2026"},"content":{"rendered":"<section class=\"ti-digest-brief\">\n<p class=\"ti-digest-kicker\">ThreatInfo research digest<\/p>\n<p class=\"ti-digest-lead\">A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.<\/p>\n<div class=\"ti-digest-summary\">\n<div><span>New report links<\/span><strong>20<\/strong><\/div>\n<div><span>Tracked categories<\/span><strong>5<\/strong><\/div>\n<div><span>Primary action<\/span><strong>Verify hash<\/strong><\/div>\n<\/div>\n<\/section>\n<section class=\"ti-digest-map\">\n<h2>Category overview<\/h2>\n<div class=\"ti-digest-watchlist\"><a href=\"https:\/\/threatinfo.net\/categories\/adware\"><strong>Adware<\/strong><span>4 new reports<\/span><\/a><a href=\"https:\/\/threatinfo.net\/categories\/pup\"><strong>PUP\/PUA<\/strong><span>4 new reports<\/span><\/a><a href=\"https:\/\/threatinfo.net\/categories\/trojan\"><strong>Trojan<\/strong><span>4 new reports<\/span><\/a><a href=\"https:\/\/threatinfo.net\/categories\/ransom\"><strong>Ransomware<\/strong><span>4 new reports<\/span><\/a><a href=\"https:\/\/threatinfo.net\/categories\/virus\"><strong>Virus<\/strong><span>4 new reports<\/span><\/a><\/div>\n<\/section>\n<section class=\"ti-digest-reports\">\n<h2>Reports worth opening<\/h2>\n<div class=\"ti-digest-category\">\n<div class=\"ti-digest-category-head\">\n<h3>Adware<\/h3>\n<p>Review browser changes, bundled installers, extensions, and unexpected advertising behavior.<\/p>\n<\/div>\n<div class=\"ti-digest-table\">\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/delegate_execute_IObitDel.exe-94f2162afb48e3d6aac78490259d8131\">delegate_execute_IObitDel.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Adware.Shopper<\/strong><\/div>\n<div><span>MD5<\/span><code>94f2162afb48e3d6aac78490259d8131<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/metro_driver_IObitDel.dll-376694cc99a73ab80eadd952484e63e8\">metro_driver_IObitDel.dll<\/a><\/div>\n<div><span>Detection<\/span><strong>Adware.Shopper<\/strong><\/div>\n<div><span>MD5<\/span><code>376694cc99a73ab80eadd952484e63e8<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/chrome_watcher_IObitDel.dll-6447e275a16da1d6fc9dc1d40538707e\">chrome_watcher_IObitDel.dll<\/a><\/div>\n<div><span>Detection<\/span><strong>Adware.Shopper<\/strong><\/div>\n<div><span>MD5<\/span><code>6447e275a16da1d6fc9dc1d40538707e<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/nacl64_IObitDel.exe-e127e9d605635df6e22876d1282e5bfe\">nacl64_IObitDel.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Adware.Shopper<\/strong><\/div>\n<div><span>MD5<\/span><code>e127e9d605635df6e22876d1282e5bfe<\/code><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ti-digest-category\">\n<div class=\"ti-digest-category-head\">\n<h3>PUP\/PUA<\/h3>\n<p>Check whether the file came from an installer bundle, optimizer, updater, or optional offer.<\/p>\n<\/div>\n<div class=\"ti-digest-table\">\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/9654796840502758392.exe-94bfdc941878aacd633d6c6596d0e3e6\">9654796840502758392.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Under review<\/strong><\/div>\n<div><span>MD5<\/span><code>94bfdc941878aacd633d6c6596d0e3e6<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/chrmstp.exe.del-539226398e549db4ad8dbfdef5049a65\">chrmstp.exe.del<\/a><\/div>\n<div><span>Detection<\/span><strong>General Threat<\/strong><\/div>\n<div><span>MD5<\/span><code>539226398e549db4ad8dbfdef5049a65<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/stats_uploader.exe.del-5621e6f75d6576e39461747b25131813\">stats_uploader.exe.del<\/a><\/div>\n<div><span>Detection<\/span><strong>General Threat<\/strong><\/div>\n<div><span>MD5<\/span><code>5621e6f75d6576e39461747b25131813<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/UCAgent.exe.del-94e200359659754a01ce765421e85a3a\">UCAgent.exe.del<\/a><\/div>\n<div><span>Detection<\/span><strong>General Threat<\/strong><\/div>\n<div><span>MD5<\/span><code>94e200359659754a01ce765421e85a3a<\/code><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ti-digest-category\">\n<div class=\"ti-digest-category-head\">\n<h3>Trojan<\/h3>\n<p>Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.<\/p>\n<\/div>\n<div class=\"ti-digest-table\">\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/AutoClick%2B2.2_2.exe-cbcfaeb22e4847a6b1c33bb520b6920a\">AutoClick 2.2_2.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.Agent<\/strong><\/div>\n<div><span>MD5<\/span><code>cbcfaeb22e4847a6b1c33bb520b6920a<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/32.exe-87bcefddbb591c34932d5218c1862702\">32.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>General Threat<\/strong><\/div>\n<div><span>MD5<\/span><code>87bcefddbb591c34932d5218c1862702<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/vCrack%2B2017.exe-b21fe8bd5f4df84328a6b39818bbb7c5\">vCrack 2017.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.Agent<\/strong><\/div>\n<div><span>MD5<\/span><code>b21fe8bd5f4df84328a6b39818bbb7c5<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/ADOBE%2BCS5.5%2BKEYGEN.exe-df9f6bfca92822cc878eac8faeecdf50\">ADOBE CS5.5 KEYGEN.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>General Threat<\/strong><\/div>\n<div><span>MD5<\/span><code>df9f6bfca92822cc878eac8faeecdf50<\/code><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ti-digest-category\">\n<div class=\"ti-digest-category-head\">\n<h3>Ransomware<\/h3>\n<p>Prioritize isolation and backup checks when this class appears on an endpoint.<\/p>\n<\/div>\n<div class=\"ti-digest-table\">\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/JkDefragScreenSaver.scr-c115ac21da61965c5ecf203772e0777f\">JkDefragScreenSaver.scr<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.DelShad<\/strong><\/div>\n<div><span>MD5<\/span><code>c115ac21da61965c5ecf203772e0777f<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/mssecsvc.exe.quarantined-3d3b7e106612cc5086ef3e8aff697829\">mssecsvc.exe.quarantined<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.WannaCrypt<\/strong><\/div>\n<div><span>MD5<\/span><code>3d3b7e106612cc5086ef3e8aff697829<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/Fishdom%2BScreensaver.scr-d0d92aad1f57ebbe62375f2c3acbd1cf\">Fishdom Screensaver.scr<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.Agent<\/strong><\/div>\n<div><span>MD5<\/span><code>d0d92aad1f57ebbe62375f2c3acbd1cf<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/lnsciqwb.exe-98a8ced05b34189b8b36760049b2ea36\">lnsciqwb.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Ransom.Blocker<\/strong><\/div>\n<div><span>MD5<\/span><code>98a8ced05b34189b8b36760049b2ea36<\/code><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ti-digest-category\">\n<div class=\"ti-digest-category-head\">\n<h3>Virus<\/h3>\n<p>Look for copied or modified executables and scan related files created around the same time.<\/p>\n<\/div>\n<div class=\"ti-digest-table\">\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/14570768.t.exe-f6fccfba5e4efe0ba613878c9a894d36\">14570768.t.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Virus.Ramnit<\/strong><\/div>\n<div><span>MD5<\/span><code>f6fccfba5e4efe0ba613878c9a894d36<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/0X48040023.exe-a101544a8a79ee3c1584de630be96ee4\">0X48040023.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Trojan.Agent<\/strong><\/div>\n<div><span>MD5<\/span><code>a101544a8a79ee3c1584de630be96ee4<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/vcredist_x64.exe-e0e6d2130c78a8644998ee10300040eb\">vcredist_x64.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Virus.Jeefo<\/strong><\/div>\n<div><span>MD5<\/span><code>e0e6d2130c78a8644998ee10300040eb<\/code><\/div>\n<\/div>\n<div class=\"ti-digest-row\">\n<div><span>File<\/span><a href=\"https:\/\/threatinfo.net\/files\/hltv.exe-546b4a454fd89008ce55d0fe92ec7654\">hltv.exe<\/a><\/div>\n<div><span>Detection<\/span><strong>Virus.Jeefo<\/strong><\/div>\n<div><span>MD5<\/span><code>546b4a454fd89008ce55d0fe92ec7654<\/code><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"ti-digest-action\">\n<h2>How to use this digest<\/h2>\n<p>Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with <a href=\"https:\/\/threatinfo.net\/download\">GridinSoft Anti-Malware<\/a>. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>ThreatInfo research digest A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"ThreatInfo Detection Digest: May 14, 2026\" class=\"read-more button\" href=\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#more-109\" aria-label=\"More on ThreatInfo Detection Digest: May 14, 2026\">Read more<\/a><\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[50],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research<\/title>\n<meta name=\"description\" content=\"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research\" \/>\n<meta property=\"og:description\" content=\"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatInfo Research\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T03:27:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\",\"url\":\"https:\/\/threatinfo.net\/articles\/\",\"name\":\"ThreatInfo Research\",\"description\":\"Malware explainers, daily file-report links, hashes, GridinSoft detections, and remediation guidance from ThreatInfo Research\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/threatinfo.net\/articles\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#webpage\",\"url\":\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/\",\"name\":\"ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research\",\"isPartOf\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\"},\"datePublished\":\"2026-05-14T03:27:05+00:00\",\"dateModified\":\"2026-05-14T03:27:05+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.\",\"breadcrumb\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/threatinfo.net\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ThreatInfo Detection Digest: May 14, 2026\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research","description":"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/","og_locale":"en_US","og_type":"article","og_title":"ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research","og_description":"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.","og_url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/","og_site_name":"ThreatInfo Research","article_published_time":"2026-05-14T03:27:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/threatinfo.net\/articles\/#website","url":"https:\/\/threatinfo.net\/articles\/","name":"ThreatInfo Research","description":"Malware explainers, daily file-report links, hashes, GridinSoft detections, and remediation guidance from ThreatInfo Research","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/threatinfo.net\/articles\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#webpage","url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/","name":"ThreatInfo Detection Digest: May 14, 2026 - ThreatInfo Research","isPartOf":{"@id":"https:\/\/threatinfo.net\/articles\/#website"},"datePublished":"2026-05-14T03:27:05+00:00","dateModified":"2026-05-14T03:27:05+00:00","author":{"@id":""},"description":"ThreatInfo detection digest with new file reports, malware categories, MD5 hashes, and GridinSoft verdict context.","breadcrumb":{"@id":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-14\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/threatinfo.net\/articles\/"},{"@type":"ListItem","position":2,"name":"ThreatInfo Detection Digest: May 14, 2026"}]}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":103,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-13\/","url_meta":{"origin":109,"position":0},"title":"ThreatInfo Detection Digest: May 13, 2026","date":"May 13, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":110,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-15\/","url_meta":{"origin":109,"position":1},"title":"ThreatInfo Detection Digest: May 15, 2026","date":"May 15, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":113,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-16\/","url_meta":{"origin":109,"position":2},"title":"ThreatInfo Detection Digest: May 16, 2026","date":"May 16, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":114,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-17\/","url_meta":{"origin":109,"position":3},"title":"ThreatInfo Detection Digest: May 17, 2026","date":"May 17, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":115,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-18\/","url_meta":{"origin":109,"position":4},"title":"ThreatInfo Detection Digest: May 18, 2026","date":"May 18, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":116,"url":"https:\/\/threatinfo.net\/articles\/threatinfo-daily-digest-2026-05-19\/","url_meta":{"origin":109,"position":5},"title":"ThreatInfo Detection Digest: May 19, 2026","date":"May 19, 2026","format":false,"excerpt":"ThreatInfo research digestA concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.New report links20Tracked categories5Primary actionVerify hashCategory overviewAdware4 new reportsPUP\/PUA4 new reportsTrojan4 new\u2026","rel":"","context":"In &quot;Daily Digest&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/109"}],"collection":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":0,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"wp:attachment":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}