
Weekly Intelligence Snapshot – Week 16
This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver

This week, QuoIntelligence reveals our internal investigation findings about an ongoing phishing campaign delivering the banking trojan known as Gozi

This week we report on the ongoing conflict in Ukraine, possibly resulting in a longer second phase of the invasion.

This week we cover the ongoing conflict in Ukraine as a potential peace agreement between Russia and Ukraine seems unlikely

As the invasion of Ukraine enters its second month, there are no signs of a potential peacea greement any time

QuoIntelligence assesses the conflict in Ukraine is unlikely to be solved in the short and medium term. We assess that

As the Russian invasion in Ukraine enters its third week, we analyze the latest cyber security events surrounding the invasion

As the Russian invasion of Ukraine is ongoing, the threat of cyberattacks increases. NATO and EU have provided weapons to

Russian President Vladimir Putin announced the decision to carry out a military operation in the Donbas region of eastern Ukraine.

Following the increasingly tense situation in Ukraine, this week read about the unconfirmed withdrawal of Russian troops and a DDoS
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue