
EU Council Adopts New Cybersecurity Strategy
The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!
QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary
IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,
DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.
In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be
Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain
The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement
In the following blog post, we will provide an overview of the major cyber security trends observed over 2020 and
In this second blog post in our series on Geopolitics in Cyber Threat Intelligence, we will explain what is meant
The cyber-threat landscape increased significantly this year due to the COVID-19 pandemic caused by accelerated digitization and the sudden shift
Try searching our blog
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Affiliate marketing drives traffic and conversions in competitive industries like iGaming, but unethical techniques are on the rise. QuoIntelligence’s investigation uncovered a large-scale campaign using AI-generated content, automation, fake social media accounts, and Black Hat SEO to manipulate rankings and deceive users.
Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors
Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity