The cyber-threat landscape increased significantly this year due to the COVID-19 pandemic caused by accelerated digitization and the sudden shift to remote working. As the pandemic continues, the potential of an upcoming recession persists, possibly resulting in decreased budgets available for cybersecurity, as well as increasing alert fatigue.
Our declassified threat intelligence analysis on a APT28 spear phishing campaign delivering Zebrocy malware to target at least a government body in the Middle East using a NATO course as a lure.
In this blog, we explain how TIBER-EU tests are conducted and describe the role of the Threat Intelligence Provider in these exercises.
You can find here the latest threat intelligence updates on the new BlackWater Malware campaign using the Beirut tragedy to lure targets.
Learn more about the Golden Chickens Malware-as-a-Service tool updates observed in recent malware campaigns against the financial, retail, and chemical sectors.
This post is the first part of a two-part blog series in which we will explain the TIBER-EU framework and how financial institutions can benefit from conducting this cyber resilience test.
This post is the first in a series of five short blogposts, in which we will explain why geopolitics is an integral part of our cyber threat intelligence analyses. Each blogpost will outline an aspect of the importance of this approach for us, our clients, and the Cyber Threat Intelligence community.
Newly uncovered DNS tunnelling technique, and new campaign against South Korean gaming company Executive Summary In January 2020, QuoIntelligence (QuoINT) detected a new Winnti sample uploaded to a public virus scanner from a German location. Following our preliminary...
We outlined some recommended measures for CIOs and CISOs to help address the potential cyber security impact of the increase of remote working during the COVID-19 pandemic.
In order to address the potential impact of the spread of COVID-19 across Europe, here’s a few points the Chief Information and Security Officers (CIOs and CISOs) should consider.