
Golden Chickens: A Compilation of our In-House Research
aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens
The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!
QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary
IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,
DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.
In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be
Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain
The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement
In the following blog post, we will provide an overview of the major cyber security trends observed over 2020 and
In this second blog post in our series on Geopolitics in Cyber Threat Intelligence, we will explain what is meant
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament