
Threat Intelligence Snapshot: Week 05, 2024
UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment
Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat
North Korean Threat Actor Gathering Strategic Intelligence | GDPR Enforcement: France’s Fines Amazon EUR 32 Million For Employee Monitoring
Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti
Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
A critical vulnerability in Google’s authentication process allows cybercriminal to regenerate and reuse stolen cookies indefinitely.
Final Weekly Intelligence Bulletin of 2023 | Kaspersky reveals more about Operation Triangulation, the highly advanced spyware.
In this Week’s Intelligence Update: Newly Discovered SMTP Smuggling Attack | Geopolitical Implications of Iranian Petrol Station Cyberattack
Microsoft released Patch Tuesday security update with fixes for 34 vulnerabilities (4 critical, one Zero-Day.
Try searching our blog
IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela Oil Buyers Threatened
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and Emerging Technologies
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Affiliate marketing drives traffic and conversions in competitive industries like iGaming, but unethical techniques are on the rise. QuoIntelligence’s investigation uncovered a large-scale campaign using AI-generated content, automation, fake social media accounts, and Black Hat SEO to manipulate rankings and deceive users.