
Threat Intelligence Snapshot: Week 43, 2025
Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet,

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet,

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control

The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities,

QuoIntelligence forecasts the 2025 cyber threat landscape, assessing likely evolutions of the eCrime ecosystem and the impact of geopolitical dynamics

Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of

Donald Trump’s second term as the 47th President will influence world’s affairs. QuoIntelligence explores anticipated shifts in US foreign and

Donald Trump’s second term as the 47th President will influence US cybersecurity policy and the global threat landscape. QuoIntelligence explores

The NIS2 Directive expands the scope of cybersecurity regulations in the EU. QuoIntelligence explores which sectors are affected and the

The 2024 US presidential election is a key event in global geopolitics, with Russia, China, Iran, and North Korea all
Try searching our blog

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They spotlight unique findings, from new threat actor tactics to critical geopolitical-cyber links, offering timely, high-value insights that go beyond our regular reporting.

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker