
Threat Intelligence Snapshot: Week 18, 2024
New Ransomware Group Dubbed APT73 Shares Similarities with LockBit’s DLS | NIS2 Cybersecurity Directive Key Takeaways
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
New Ransomware Group Dubbed APT73 Shares Similarities with LockBit’s DLS | NIS2 Cybersecurity Directive Key Takeaways
Cheap Ransomware Tools Proliferating in the Underground | Chinese Espionage: New Cases In Germany, Growing Concern In Europe
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Large-Scale StrelaStealer Campaign Targets Europe | Russia-Ukraine Conflict Is Likely Far From End Resulting in Continued Instability
Red Teaming Malicious Use Cases for AI | Global Supply Chains Facing Growing Geopolitical Risks
QuoIntelligence analyzes Microsoft’s Patch Tuesday security update | key elements of the landmark EU’s AI Act
Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024
Doppelgänger: Influence Operation Targets German Political Landscape | NIST Cybersecurity Framework 2.0 Points at Supply Chain and AI Risks
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament