
The Proxy Warfare: Unmasking Russia’s Externalized Cyber Capabilities
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
Affiliate marketing drives traffic and conversions in competitive industries like iGaming, but unethical techniques are on the rise. QuoIntelligence’s investigation
In 2024, deepfakes played a pivotal role in several high-profile cases of financial fraud and targeted disinformation campaigns, underscoring their
QuoIntelligence forecasts the 2025 cyber threat landscape, assessing likely evolutions of the eCrime ecosystem and the impact of geopolitical dynamics
Donald Trump’s second term as the 47th President will influence US cybersecurity policy and the global threat landscape. QuoIntelligence explores
The 2024 US presidential election is a key event in global geopolitics, with Russia, China, Iran, and North Korea all
One year after the unprecedented Hamas attack on Israel, the Middle East remains a hotspot of geopolitical tensions and cyber
QuoIntelligence examines how various criminal networks leverage Telegram for illicit activities and assess the impact of its CEO, Pavel Durov’s
QuoIntelligence uncovers the Ticket Heist campaign targeting ticket buyers for the Paris 2024 Olympics. This fraudulent scheme impacts Russian-speaking users
The landscape of ransomware attacks has witnessed significant shifts from Q4 2023 to Q1 2024 after several ransomware disruptions. Ransomware
Try searching our blog
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament
Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI Impact Assessment