
Threat Intelligence Snapshot: Week 30, 2024
Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development
EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks
Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation
TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs
Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering
Scattered Spider Targets SaaS, Ivanti and VMware CVEs | Cyber Insurance Claims Hit Record, NATO To Increase Vigilance On Russian
Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea
Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea
Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea
Grandoreiro Trojan Reemerges Targeting More Than 1,500 Banks Globally | Analyzing Impact Of EU Decision To Use Russian Frozen Assets
Try searching our blog
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
The Digital Operational Resilience Act (DORA) came into force on 17 January 2025, imposing new compliance challenges on financial entities, including stricter ICT risk management, third-party dependency oversight, and mandatory incident reporting. In this post, QuoIntelligence offers a detailed breakdown of DORA’s scope, regulatory requirements, enforcement mechanisms, and key deadlines, guiding financial institutions and ICT providers through their obligations.
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek