
How the Demise of Third-Party Cookies Will Influence Data Security
The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.

An unsecured database consisting of 533 million Facebook users’ data was made publicly available last week and raises the necessity

aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens

The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!

QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary

IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,

DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be

Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain

The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement
Try searching our blog

New Wave of Vishing Campaigns Against Identity Providers Targets Okta, Microsoft, Google, and Cryptocurrency Platforms | France To Ditch US Platforms Microsoft Teams, Zoom For Sovereign Platform Citing Security Concerns
In this outlook report, QuoIntelligence assesses the expected threat landscape for 2026, examining key developments across eCrime, malware evolution, hacktivism, and state‑sponsored activity.

North Korean Threat Actors Expand Contagious Interview Campaign With Malicious VS Code Targeting Developers | European Commission Proposes New Cybersecurity Package To Strengthen Resilience and Capabilities

VoidLink: A Modular Linux C2 Framework Targeting Cloud and Container Environments | Fundamental Disagreement Between US and Denmark Over Greenland, Europeans To Send Troops