
The Proxy Warfare: Unmasking Russia’s Externalized Cyber Capabilities
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities,
QuoIntelligence forecasts the 2025 cyber threat landscape, assessing likely evolutions of the eCrime ecosystem and the impact of geopolitical dynamics
Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of
Donald Trump’s second term as the 47th President will influence world’s affairs. QuoIntelligence explores anticipated shifts in US foreign and
Donald Trump’s second term as the 47th President will influence US cybersecurity policy and the global threat landscape. QuoIntelligence explores
The NIS2 Directive expands the scope of cybersecurity regulations in the EU. QuoIntelligence explores which sectors are affected and the
The 2024 US presidential election is a key event in global geopolitics, with Russia, China, Iran, and North Korea all
One year after the unprecedented Hamas attack on Israel, the Middle East remains a hotspot of geopolitical tensions and cyber
QuoIntelligence examines how various criminal networks leverage Telegram for illicit activities and assess the impact of its CEO, Pavel Durov’s
Try searching our blog
Researchers Expose Zero-Day Clickjacking Flaws in Password Managers | European Postal Operators Halt US Parcel Shipments Over Tax Uncertainty
Long-Term Compromise of Cisco Devices by Russian APT Using CVE-2018-0171 | European Postal Operators Halt US Parcel Shipments Over Tax Uncertainty
RomCom Exploits WinRAR Zero-Day in Targeted Espionage Campaign | Norway Says Russian Threat Actor Likely Behind Dam Sabotage
Akira Ransomware Exploits SonicWall VPN for Initial Access | China Outsources Information Warfare Efforts To AI Companies