
Weekly Intelligence Snapshot – Week 14
Kaspersky reports that some victims compromised in the SupplyChain attack against 3CX’s Desktop Application VoIP software also had the Gopuram
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Kaspersky reports that some victims compromised in the SupplyChain attack against 3CX’s Desktop Application VoIP software also had the Gopuram

Vulnerability CVE-2023-23397 is being exploited to target private and public defense sector organizations. We analyze the campaign and also examine

QuoIntelligence outlines the main features of two EU legislation proposals, the Net Zero Industry Act and Critical Raw Materials Act,

Europe continues to come under cyber attack from a Russian Threat Actor and what is happening in the Banking sector.

Emotet, the popular MaaS Trojan and Infostealer is in the news with a new wave of activity.

Another busy week: Gamaredon is growing as we see a malicious document sample uploaded to malware analysis services, BlackLotus is

We track a campaign where a OneNote file delivers QakBot through politically-themed emails. China published its GSI concept and a

QuoIntelligence research team identified an ongoing phishing campaign targeting companies across all sectors worldwide.

QuoIntelligence is the first to publish on a new campaign with multi-stage lures aiming to infect victims with Fsociety framework-based

In the week when we forecast Ransomware will continue to proliferate, Trend Micro announced a new family dubbed “Mimic”.
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue