
Weekly Intelligence Snapshot – Week 25
Quointelligence is analyzing the use of Follina vulnerability in the campaign targeting entities in Ukraine reported by the CERT-UA, allegedly
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Quointelligence is analyzing the use of Follina vulnerability in the campaign targeting entities in Ukraine reported by the CERT-UA, allegedly

We analyzed the encryption software samples used in HelloXD’s Ransomware operation and provide an update of the latest legislation regarding

This week we provide analysis into IndustrialSpy and their encryption software, which they recently leveraged in cyber operations.

Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,

Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,

In this Weekly we report on how a threat actor, possibly Russian, is targeting users in Germany by using information

In this weekly we investigate the emerging threat of NodePacketManager (NPM) becoming an attack vector for supply chains and the

QuoIntelligence is tracking a campaign where the threat actors are using the remote template injection to deliver an espionage implant

This week we cover our observations of #Emotet development, including differences in #TTPs observed in recent samples. We also cover

This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver
Try searching our blog

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths