
Threat Intelligence Snapshot: Week 49, 2024
Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of
Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability
Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation
Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation
SharePoint vulnerability CVE-2024-38094 exploited for credential theft | US elections to reshape global power dynamics
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
Try searching our blog
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities, including stricter ICT risk management, third-party dependency oversight, and mandatory incident reporting. In this post, QuoIntelligence offers a detailed breakdown of DORA’s scope, regulatory requirements, enforcement mechanisms, and key deadlines, guiding financial institutions and ICT providers through their obligations.
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek
QuoIntelligence GmbH, a recognized European Threat Intelligence provider, has been awarded a 1.4-million-euro contract to provide ENISA with cyber threat intelligence over a period of 4 years.