
Weekly Intelligence Snapshot – Week 28, 2023
Researchers from Microsoft discovered a phishing campaign by the eCrime actor Storm-0978/RomCom targeting defense and government entities in Europe and
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Researchers from Microsoft discovered a phishing campaign by the eCrime actor Storm-0978/RomCom targeting defense and government entities in Europe and
Major Spanish banks among specific targets for Neo_Net. We are tracking this Threat Actor on Telegram.
SentinelOne, Bitdefender & Elastic have reported on the emerging threat actor JokerSpy that targets enterprise MacOS devices with multistage spyware.
Pro-Russia Hacktivist group Anonymous Sudan attacked Microsoft Azure, disrupting services for two hours.
UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.
Creators of the Ransomware-as-a-Service dubbed NoEscape are actively recruiting affiliates to spread this wide-functionality RaaS which allows for defense evasion.
Threat Actor “Spyboy” is selling software claiming to terminate AV and EDR processes of EDRs.
G7 Summit: Leaders prioritize supply chain resilience and fair trade practices.
Officials in multiple European countries were targeted by a newly discovered malicious firmware implant called “Horse Shell”.
The National Security Agency (NSA) and partner agencies have identified the infrastructure for Snake malware, a Russian cyberespionage tool, in
Try searching our blog
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and Emerging Technologies
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Affiliate marketing drives traffic and conversions in competitive industries like iGaming, but unethical techniques are on the rise. QuoIntelligence’s investigation uncovered a large-scale campaign using AI-generated content, automation, fake social media accounts, and Black Hat SEO to manipulate rankings and deceive users.
Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors