
Golden Chickens: A Compilation of our In-House Research
aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens

The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!

QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary

IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,

DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be

Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain

The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement

In the following blog post, we will provide an overview of the major cyber security trends observed over 2020 and

In this second blog post in our series on Geopolitics in Cyber Threat Intelligence, we will explain what is meant
Try searching our blog

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They spotlight unique findings, from new threat actor tactics to critical geopolitical-cyber links, offering timely, high-value insights that go beyond our regular reporting.

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker

LockBit, DragonForce, and Qilin Forge Alliance to Amplify Global Ransomware Operations | Israel and Hamas Signed Off On First Phase of Gaza Deal