
Weekly Intelligence Snapshot – Week 25
Quointelligence is analyzing the use of Follina vulnerability in the campaign targeting entities in Ukraine reported by the CERT-UA, allegedly
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Quointelligence is analyzing the use of Follina vulnerability in the campaign targeting entities in Ukraine reported by the CERT-UA, allegedly
We analyzed the encryption software samples used in HelloXD’s Ransomware operation and provide an update of the latest legislation regarding
This week we provide analysis into IndustrialSpy and their encryption software, which they recently leveraged in cyber operations.
Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,
Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,
In this Weekly we report on how a threat actor, possibly Russian, is targeting users in Germany by using information
In this weekly we investigate the emerging threat of NodePacketManager (NPM) becoming an attack vector for supply chains and the
QuoIntelligence is tracking a campaign where the threat actors are using the remote template injection to deliver an espionage implant
This week we cover our observations of #Emotet development, including differences in #TTPs observed in recent samples. We also cover
This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.