
Weekly Intelligence Snapshot – Week 08
We track a campaign where a OneNote file delivers QakBot through politically-themed emails. China published its GSI concept and a
We track a campaign where a OneNote file delivers QakBot through politically-themed emails. China published its GSI concept and a
It’s been a turbulent week, especially for Germany-based organizations. As Germany and the US announced they are to supply frontline
Microsoft releases its Patch Tuesday update with two Zero-Day vulnerabilities, one exploited in Malware distribution.
Regulatory landscapes more complex as
This week we highlight Telecommunication and business process outsourcing companies hit by SIM swapping operations. In geopolitics, we look at
This week we report Emotet is still active. The DFIR Report describes an incident in May 2022 which began with
In this Weekly we report on how a threat actor, possibly Russian, is targeting users in Germany by using information
In this weekly we investigate the emerging threat of NodePacketManager (NPM) becoming an attack vector for supply chains and the
QuoIntelligence is tracking a campaign where the threat actors are using the remote template injection to deliver an espionage implant
This week we cover our observations of #Emotet development, including differences in #TTPs observed in recent samples. We also cover
As the Russian invasion in Ukraine enters its third week, we analyze the latest cyber security events surrounding the invasion
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.