
Weekly Intelligence Snapshot – Week 08
We track a campaign where a OneNote file delivers QakBot through politically-themed emails. China published its GSI concept and a

We track a campaign where a OneNote file delivers QakBot through politically-themed emails. China published its GSI concept and a

It’s been a turbulent week, especially for Germany-based organizations. As Germany and the US announced they are to supply frontline

Microsoft releases its Patch Tuesday update with two Zero-Day vulnerabilities, one exploited in Malware distribution.
Regulatory landscapes more complex as

This week we highlight Telecommunication and business process outsourcing companies hit by SIM swapping operations. In geopolitics, we look at

This week we report Emotet is still active. The DFIR Report describes an incident in May 2022 which began with

In this Weekly we report on how a threat actor, possibly Russian, is targeting users in Germany by using information

In this weekly we investigate the emerging threat of NodePacketManager (NPM) becoming an attack vector for supply chains and the

QuoIntelligence is tracking a campaign where the threat actors are using the remote template injection to deliver an espionage implant

This week we cover our observations of #Emotet development, including differences in #TTPs observed in recent samples. We also cover

As the Russian invasion in Ukraine enters its third week, we analyze the latest cyber security events surrounding the invasion
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure