Blog
Our latest declassified research, analyst’s notes, blog posts from our cybersecurity experts, education material, and so much more.
Decoding 2024’s Threat Landscape
Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat landscape and global economy.
UNC5221: Unreported and Undetected WIREFIRE Web Shell Variant
Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti Connect Secure (ICS) VPN compromised appliances.
Betrugswarnung: “Handelsregister” Rechnungen. Schützen Sie Ihr Unternehmen vor gefälschten “Registergericht”-Dokumenten
Eine neue Betrugsmasche hat es erfolgreich auf Unternehmen abgesehen, die ihre Angaben im Handelsregister kürzlich aktualisiert haben. Obwohl diese Rechnungen überzeugend sind, weisen sie doch verräterische Anzeichen auf, die Sie erkennen können, um nicht zum Opfer zu werden.
Fake Handelsregister Invoices: 5 Telltale Signs to Avoid The Scam
A new scam is successfully targeting companies which have recently made updates to their information in the Handelsregister. Although convincing, these invoices have tell tale signs you can spot to avoid becoming a victim.
Analysis of The Red Cross’ Rules Of Engagement For Hacktivists
The new law-based rules for “civilian hackers” during war and the obligations of states to restrain them.
GDPR: Analysis of Five Years of Enforcement
This report provides insight into the enforcement trends of the EU’s General Data Protection Regulation (GDPR) over five years.
Sharon De Cet shares her Experience as Official Mentor for the Women4Cyber Foundation
ECSO-backed Women4Cyber Mentorship programme is designed to help women improve their skills and advance their cybersecurity careers at all levels.
Decoding Disinformation: The Spanish Election Information Operation Targeting Russian-Speakers
QuoIntelligence analyzed an information operation campaign aiming to discourage Russian speaking citizens from voting in the latest Spanish elections.
EU Digital Operational Resilience Act: Tougher Cybersecurity Requirements for Financial Institutions & Their Implications
Analysis and evaluation of the DORA regulation, which establishes a single European regulatory framework for the management of risks derived from ICT (Information and Communications Technology).
Hamas–Israel Crisis: Impact on Geopolitics and Cyber Threat Landscape for the European Energy Sector
Analysis of the Hamas-Israel crisis and the main cyber and geopolitical takeaways for European oil and gas companies