
Threat Intelligence Snapshot: Week 44, 2023
Microsoft releases report on Threat Actor Octo Tempest, described as “one of the most dangerous financial crime groups”, using Social
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Microsoft releases report on Threat Actor Octo Tempest, described as “one of the most dangerous financial crime groups”, using Social

Okta suffered a breach in its support management system. Threat Actors used stolen creds to view support files uploaded by

Updates on the geopolitical and cyber threat landscapes from the Hamas-Israel crisis. Plus a look at the PureLogs stealer malware

Security updates from Microsoft and other vendors, plus the geopolitical/cyber implications of Hamas-Palestinian Islamic Jihad’s offensive on Israel.

FBI issues alert for Dual Ransomware Attacks where victims face multiple extortion attempts in 10 days or less.

After the US SEC fined Deutsche Bank-controlled investment firm DWS this week, QuoIntelligence analyzes increased regulatory scrutiny over greenwashing.

Wiz Research detects exposure of Microsoft internal data from a SAS token misconfiguration.

Microsoft released its monthly Patch Tuesday security update, with fixes for 59 flaws; two of which are actively exploited Zero

QuoIntelligence’s Weekly Intelligence Snapshot for the week of 31 August – 6 September 2023 is now available! Find a summary here

Mandiant describes how Chinese-nexus Threat Group UNC4841 maintains a presence in victims’ environments.
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue