The Importance of Geopolitics for Cyber Threat Intelligence
This post is the first in a series of five short blogposts, in which we will explain why geopolitics is
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This post is the first in a series of five short blogposts, in which we will explain why geopolitics is
Newly uncovered DNS tunnelling technique, and new campaign against South Korean gaming company Executive Summary In January 2020, QuoIntelligence (QuoINT)
We outlined some recommended measures for CIOs and CISOs to help address the potential cyber security impact of the increase
In order to address the potential impact of the spread of COVID-19 across Europe, here’s a few points the Chief
Note: This article was initially written by the QuoINT Team as part of QuoScient GmbH. Since the foundation of
This blog post provides an overview on a specific Malware-as-a-Service (MaaS) used within the e-Crime threat actor landscape. It also
Try searching our blog
Attackers exploit DLink router vulnerabilities, Palo Alto Patch For Vulnerability In PAN OS | NATO To Boost Baltic Sea Presence After Undersea Cables Broken
Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for GDPR non-compliance
Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank Governance, Climate Risk Management
Deepfake Fraud Threatens Financial Institutions | Operation PowerOFF Shuts Down 27 DDoS Platforms | EU To Strengthen ENISA And Enforce EU Cybersecurity Certification Framework