
Decoding 2024’s Threat Landscape
Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat

Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti

Eine neue Betrugsmasche hat es erfolgreich auf Unternehmen abgesehen, die ihre Angaben im Handelsregister kürzlich aktualisiert haben. Obwohl diese Rechnungen

A new scam is successfully targeting companies which have recently made updates to their information in the Handelsregister. Although convincing,

The new law-based rules for “civilian hackers” during war and the obligations of states to restrain them.

This report provides insight into the enforcement trends of the EU’s General Data Protection Regulation (GDPR) over five years.

ECSO-backed Women4Cyber Mentorship programme is designed to help women improve their skills and advance their cybersecurity careers at all levels.

QuoIntelligence analyzed an information operation campaign aiming to discourage Russian speaking citizens from voting in the latest Spanish elections.

Analysis and evaluation of the DORA regulation, which establishes a single European regulatory framework for the management of risks derived

Analysis of the Hamas-Israel crisis and the main cyber and geopolitical takeaways for European oil and gas companies
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure