
The Proxy Warfare: Unmasking Russia’s Externalized Cyber Capabilities
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
QuoIntelligence forecasts the 2025 cyber threat landscape, assessing likely evolutions of the eCrime ecosystem and the impact of geopolitical dynamics
Donald Trump’s second term as the 47th President will influence world’s affairs. QuoIntelligence explores anticipated shifts in US foreign and
Donald Trump’s second term as the 47th President will influence US cybersecurity policy and the global threat landscape. QuoIntelligence explores
The 2024 US presidential election is a key event in global geopolitics, with Russia, China, Iran, and North Korea all
One year after the unprecedented Hamas attack on Israel, the Middle East remains a hotspot of geopolitical tensions and cyber
QuoIntelligence dives into the activities of the Russian disinformation network Doppelgänger on X throughout the French Parliamentary elections.
The European parliamentary elections in June 2024 face multifaceted threats in an increasingly complex and polarized threat landscape.
The global repercussions of the 7 October attack against Israel in regional security, geopolitics, and supply chains.
The new law-based rules for “civilian hackers” during war and the obligations of states to restrain them.
Try searching our blog
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament
Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI Impact Assessment