
Decoding 2024’s Threat Landscape
Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat

Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti

Eine neue Betrugsmasche hat es erfolgreich auf Unternehmen abgesehen, die ihre Angaben im Handelsregister kürzlich aktualisiert haben. Obwohl diese Rechnungen

A new scam is successfully targeting companies which have recently made updates to their information in the Handelsregister. Although convincing,

The new law-based rules for “civilian hackers” during war and the obligations of states to restrain them.

This report provides insight into the enforcement trends of the EU’s General Data Protection Regulation (GDPR) over five years.

ECSO-backed Women4Cyber Mentorship programme is designed to help women improve their skills and advance their cybersecurity careers at all levels.

QuoIntelligence analyzed an information operation campaign aiming to discourage Russian speaking citizens from voting in the latest Spanish elections.

Analysis and evaluation of the DORA regulation, which establishes a single European regulatory framework for the management of risks derived

Analysis of the Hamas-Israel crisis and the main cyber and geopolitical takeaways for European oil and gas companies
Try searching our blog

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker