
Weekly Intelligence Snapshot – Week 15
This week, QuoIntelligence reveals our internal investigation findings about an ongoing phishing campaign delivering the banking trojan known as Gozi
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This week, QuoIntelligence reveals our internal investigation findings about an ongoing phishing campaign delivering the banking trojan known as Gozi
This week we report on the ongoing conflict in Ukraine, possibly resulting in a longer second phase of the invasion.
This week we cover the ongoing conflict in Ukraine as a potential peace agreement between Russia and Ukraine seems unlikely
As the invasion of Ukraine enters its second month, there are no signs of a potential peacea greement any time
QuoIntelligence assesses the conflict in Ukraine is unlikely to be solved in the short and medium term. We assess that
As the Russian invasion in Ukraine enters its third week, we analyze the latest cyber security events surrounding the invasion
As the Russian invasion of Ukraine is ongoing, the threat of cyberattacks increases. NATO and EU have provided weapons to
Russian President Vladimir Putin announced the decision to carry out a military operation in the Donbas region of eastern Ukraine.
Following the increasingly tense situation in Ukraine, this week read about the unconfirmed withdrawal of Russian troops and a DDoS
For this week’s Patch Tuesday, Microsoft addressed 51 security flaws – one zero-day but none of them rated as critical.
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.