
Threat Intelligence Snapshot: Week 42, 2023
Updates on the geopolitical and cyber threat landscapes from the Hamas-Israel crisis. Plus a look at the PureLogs stealer malware
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Updates on the geopolitical and cyber threat landscapes from the Hamas-Israel crisis. Plus a look at the PureLogs stealer malware
Security updates from Microsoft and other vendors, plus the geopolitical/cyber implications of Hamas-Palestinian Islamic Jihad’s offensive on Israel.
FBI issues alert for Dual Ransomware Attacks where victims face multiple extortion attempts in 10 days or less.
After the US SEC fined Deutsche Bank-controlled investment firm DWS this week, QuoIntelligence analyzes increased regulatory scrutiny over greenwashing.
Wiz Research detects exposure of Microsoft internal data from a SAS token misconfiguration.
Microsoft released its monthly Patch Tuesday security update, with fixes for 59 flaws; two of which are actively exploited Zero
QuoIntelligence’s Weekly Intelligence Snapshot for the week of 31 August – 6 September 2023 is now available! Find a summary here
Mandiant describes how Chinese-nexus Threat Group UNC4841 maintains a presence in victims’ environments.
Microsoft adds functionality to run Python in Excel for Windows – has security implications with Malicious Script execution.
After Storm-0558 obtained Microsoft MSA keys to access some US government accounts, we analyze the impact of the incident.
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament