
How DNS-over-HTTPS (DoH) has Changed the Threat Landscape For Companies
DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be

Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain

The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement

In the following blog post, we will provide an overview of the major cyber security trends observed over 2020 and

In this second blog post in our series on Geopolitics in Cyber Threat Intelligence, we will explain what is meant

The cyber-threat landscape increased significantly this year due to the COVID-19 pandemic caused by accelerated digitization and the sudden shift

QuoIntelligence and NVISO are pleased to announce they have formed a strategic partnership to enhance the cyber resilience of financial

Our declassified threat intelligence analysis on a APT28 spear phishing campaign delivering Zebrocy malware to target at least a government

In this blog, we explain how TIBER-EU tests are conducted and describe the role of the Threat Intelligence Provider in
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal