
Weekly Intelligence Snapshot – Week 20
Officials in multiple European countries were targeted by a newly discovered malicious firmware implant called “Horse Shell”.
Officials in multiple European countries were targeted by a newly discovered malicious firmware implant called “Horse Shell”.
The cyber threat landscape evolves as quickly as technology, often faster than security teams can develop, mature and establish secure
ERMAC 2.0, one of the most active Trojans in 2022, captures credentials from over 400 android applications and circumvents MFA
The war in Ukraine, together with the Western response to Russia’s actions, has accelerated and exacerbated the amplitude of the
We analyze how the war in Ukraine has affected the global IT sector and other unexpected changes to the Global
Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,
We outlined some recommended measures for CIOs and CISOs to help address the potential cyber security impact of the increase
This blog post provides an overview on a specific Malware-as-a-Service (MaaS) used within the e-Crime threat actor landscape. It also
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament