
Threat Intelligence Snapshot: Week 40, 2023
FBI issues alert for Dual Ransomware Attacks where victims face multiple extortion attempts in 10 days or less.
FBI issues alert for Dual Ransomware Attacks where victims face multiple extortion attempts in 10 days or less.
After the US SEC fined Deutsche Bank-controlled investment firm DWS this week, QuoIntelligence analyzes increased regulatory scrutiny over greenwashing.
Wiz Research detects exposure of Microsoft internal data from a SAS token misconfiguration.
Microsoft released its monthly Patch Tuesday security update, with fixes for 59 flaws; two of which are actively exploited Zero
QuoIntelligence’s Weekly Intelligence Snapshot for the week of 31 August – 6 September 2023 is now available! Find a summary here
Research into an eCrime campaign — to Neo-Net — targetting prominent European banks, especially in Spain, with phishing and Android
Learn how QuoIntelligence helped raise Leroy Merlin Italia’s Threat Intelligence Maturity
UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.
Creators of the Ransomware-as-a-Service dubbed NoEscape are actively recruiting affiliates to spread this wide-functionality RaaS which allows for defense evasion.
Threat Actor “Spyboy” is selling software claiming to terminate AV and EDR processes of EDRs.
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.