
Threat Intelligence Snapshot: Week 40, 2024
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems
Researchers Unintentionally Gained Administrative Access To Mobi WHOIS Server After Purchasing Decommissioned Domain For Vulnerability Testing | Poland Thwarts Cyber
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force
Try searching our blog
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities, including stricter ICT risk management, third-party dependency oversight, and mandatory incident reporting. In this post, QuoIntelligence offers a detailed breakdown of DORA’s scope, regulatory requirements, enforcement mechanisms, and key deadlines, guiding financial institutions and ICT providers through their obligations.
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek