The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.
After the US sanctioned against Russia for the SolarWinds attacks, tensions between the nations could grow & likely manifest in cyberspace. Stay up-to-date on Russia’s APTs, their connection to Intelligence Services & sanctioned companies
An unsecured database consisting of 533 million Facebook users' data was made publicly available last week and raises the necessity of increased brand protection to prevent brand abuse. In January, the database was initially discovered when a threat actor was selling...
Since uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens (GC) Malware-as-a-Service provider (MaaS) and how different threat actors use it. Latest Golden Chickens Activity Lately,...
The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!
QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary of key-takeaways focusing closely on self-reliance in technology, GDP growth, national security, and more.
IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas, you should carefully focus your efforts on to succeed in cybersecurity.
DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.
In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be aware of this year gathered in an infographic.
Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain threats. More and more nations are working towards stringent frameworks to strengthen supply chain security. Read our article to find out which attack vectors, threat actors and new regulations to watch in 2021!