
Weekly Intelligence Snapshot – Week 35
This week we focus on Mobile Banking Trojan Ermac, aimed at stealing credentials from financial and Cryptocurrency applications.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This week we focus on Mobile Banking Trojan Ermac, aimed at stealing credentials from financial and Cryptocurrency applications.
This week read how LockBit suffered a DDoS attack following its #ransomware attack on Entrust – not the first time
In this week’s summary our Cyber news features the collaboration of the Microsoft Threat Intelligence Center (MSTIC), Google Threat Analysis
Our Cyber news this week majors on Microsoft’s recent Patch Tuesday Vulnerability update which deals with 121 flaws.
We report on SentinelOne’s findings on LockBit’s latest method which employs the MpCmdRun.exe executable, which is extremely difficult to detect.
This week we cover a spearphishing campaign attributed to Evilnum, which is targeting DeFi platforms in Europe.
QuoIntelligence analyzes the consequences of China’s strategy for critical industries particularly exposed to cyber espionage as well as its effects
QuoIntelligence is tracking activity related to the use of fake job offers and job applications to compromise companies for monetary
QuoIntelligence gathered and processed the different Microsoft product updates in order to provide a clear overview of the different topics
After Kaspersky ICS CERT published their findings of an active shadowPad infection, QuoIntelligence analyzed the activity further in our report.
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.