Blog
Our latest declassified research, analyst’s notes, blog posts from our cybersecurity experts, education material, and so more.
Has DarkSide Dug Its Own Grave With the Ransomware Attack on Colonial Pipeline?
DarkSide’s ransomware attack on Colonial Pipeline has brought dark shadows over the group from inside the cybercriminals community. Will ransomware operators have to adapt their approaches? What’s next?
How the Demise of Third-Party Cookies Will Influence Data Security
The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.
US Sanctions Against Russia Unlikely to Limit Russian Cyber Espionage
After the US sanctioned against Russia for the SolarWinds attacks, tensions between the nations could grow & likely manifest in cyberspace. Stay up-to-date on Russia’s APTs, their connection to Intelligence Services & sanctioned companies
Facebook Data Leak: How Brand Protection Reduces Risks
An unsecured database consisting of 533 million Facebook users' data was made publicly available last week and raises the necessity of increased brand protection to prevent brand abuse. In January, the database was initially discovered when a threat actor was selling...
Golden Chickens: A Compilation of our In-House Research
Since uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens (GC) Malware-as-a-Service provider (MaaS) and how different threat actors use it. Latest Golden Chickens Activity Lately,...
EU Council Adopts New Cybersecurity Strategy
The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!
China’s Five-Year Plan: A Pursuit for GDP Growth & Technological Self-Sufficiency
QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary of key-takeaways focusing closely on self-reliance in technology, GDP growth, national security, and more.
10 Steps To Secure Your Organization Against Cybercrime
IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas, you should carefully focus your efforts on to succeed in cybersecurity.
How DNS-over-HTTPS (DoH) has Changed the Threat Landscape For Companies
DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.
Safer Internet Day 2021: A Compilation of Organization’s Top 3 Digital Threats
In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be aware of this year gathered in an infographic.