
Shifting to Electric Vehicles: Impacts on Supply Chains, Semiconductors, and the Geopolitical Landscape
Countries around the world are creating frameworks to curb CO2 emissions, such as through banning petrol cars. These frameworks, as

Countries around the world are creating frameworks to curb CO2 emissions, such as through banning petrol cars. These frameworks, as

The International Organization for Standardization (ISO) recently presented updates to the ISO 27002 standard, which consolidates chapters and controls, as

We are honored to announce that QuoIntelligence is among the first security companies to receive the quality label “Cyber Security

DarkSide’s ransomware attack on Colonial Pipeline has brought dark shadows over the group from inside the cybercriminals community. Will ransomware

The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.

An unsecured database consisting of 533 million Facebook users’ data was made publicly available last week and raises the necessity

aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens

The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!

QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary

IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance