
Weekly Intelligence Snapshot – Week 16
This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver
This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver
This week, QuoIntelligence reveals our internal investigation findings about an ongoing phishing campaign delivering the banking trojan known as Gozi
This week we report on the ongoing conflict in Ukraine, possibly resulting in a longer second phase of the invasion.
This week we cover the ongoing conflict in Ukraine as a potential peace agreement between Russia and Ukraine seems unlikely
As the invasion of Ukraine enters its second month, there are no signs of a potential peacea greement any time
QuoIntelligence assesses the conflict in Ukraine is unlikely to be solved in the short and medium term. We assess that
As the Russian invasion of Ukraine is ongoing, the threat of cyberattacks increases. NATO and EU have provided weapons to
Following the increasingly tense situation in Ukraine, this week read about the unconfirmed withdrawal of Russian troops and a DDoS
For this week’s Patch Tuesday, Microsoft addressed 51 security flaws – one zero-day but none of them rated as critical.
This week, read about Lazarus targeting users with malicious decoy documents by leveraging Windows Update Client and GitHub. The North
Try searching our blog
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities, including stricter ICT risk management, third-party dependency oversight, and mandatory incident reporting. In this post, QuoIntelligence offers a detailed breakdown of DORA’s scope, regulatory requirements, enforcement mechanisms, and key deadlines, guiding financial institutions and ICT providers through their obligations.
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek