
Threat Intelligence Snapshot: Week 43, 2023
Okta suffered a breach in its support management system. Threat Actors used stolen creds to view support files uploaded by
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Okta suffered a breach in its support management system. Threat Actors used stolen creds to view support files uploaded by
Updates on the geopolitical and cyber threat landscapes from the Hamas-Israel crisis. Plus a look at the PureLogs stealer malware
Security updates from Microsoft and other vendors, plus the geopolitical/cyber implications of Hamas-Palestinian Islamic Jihad’s offensive on Israel.
FBI issues alert for Dual Ransomware Attacks where victims face multiple extortion attempts in 10 days or less.
After the US SEC fined Deutsche Bank-controlled investment firm DWS this week, QuoIntelligence analyzes increased regulatory scrutiny over greenwashing.
Wiz Research detects exposure of Microsoft internal data from a SAS token misconfiguration.
Microsoft released its monthly Patch Tuesday security update, with fixes for 59 flaws; two of which are actively exploited Zero
QuoIntelligence’s Weekly Intelligence Snapshot for the week of 31 August – 6 September 2023 is now available! Find a summary here
Mandiant describes how Chinese-nexus Threat Group UNC4841 maintains a presence in victims’ environments.
Microsoft adds functionality to run Python in Excel for Windows – has security implications with Malicious Script execution.
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.