
Weekly Intelligence Snapshot – Week 03
Malware such as IceID and Rhadamanthys are employed, leading to stolen credentials and Ransomware infections.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Malware such as IceID and Rhadamanthys are employed, leading to stolen credentials and Ransomware infections.
Dark Pink’s core initial vector is spear-phishing emails with threat actors posing as job applicants targeting Government and Military bodies
New year, same Cyber targets. The relentless onslaught on European financial and insurance institutions continues as Security Joes discovers a
In its latest campaign, the Lazarus sub-group BlueNoroff has been operating an infrastructure of over 70 domains impersonating venture capital
The malwareHunterTeam posted a warning about “Photo.apk” – an Android executable which QuoIntelligence determined might announce the imminent arrival
Microsoft releases its Patch Tuesday update with two Zero-Day vulnerabilities, one exploited in Malware distribution.
Regulatory landscapes more complex as
This week we highlight Telecommunication and business process outsourcing companies hit by SIM swapping operations. In geopolitics, we look at
China-nexus group uses new Malware families to infect USBs for Espionage.
Our tracking of the Mustang Panda group reveals a different DLL sideloading technique from those seen this year.
Pro-Russia hacktivist group From Russia With Love has been deploying Somnia Ransomware in Ukraine since spring 2022. But the #Malware
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.