
BlackWater Malware Leveraging Beirut Tragedy in New Targeted Campaign
You can find here the latest threat intelligence updates on the new BlackWater Malware campaign using the Beirut tragedy to

You can find here the latest threat intelligence updates on the new BlackWater Malware campaign using the Beirut tragedy to

Learn more about the Golden Chickens Malware-as-a-Service tool updates observed in recent malware campaigns against the financial, retail, and chemical

This post is the first part of a two-part blog series in which we will explain the TIBER-EU framework and
This post is the first in a series of five short blogposts, in which we will explain why geopolitics is

Newly uncovered DNS tunnelling technique, and new campaign against South Korean gaming company Executive Summary In January 2020, QuoIntelligence (QuoINT)
In order to address the potential impact of the spread of COVID-19 across Europe, here’s a few points the Chief


Note: This article was initially written by the QuoINT Team as part of QuoScient GmbH. Since the foundation of
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal