
Threat Intelligence Snapshot: Week 48, 2024
Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability

Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation

Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation

SharePoint vulnerability CVE-2024-38094 exploited for credential theft | US elections to reshape global power dynamics

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning

North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Try searching our blog

New Wave of Vishing Campaigns Against Identity Providers Targets Okta, Microsoft, Google, and Cryptocurrency Platforms | France To Ditch US Platforms Microsoft Teams, Zoom For Sovereign Platform Citing Security Concerns
In this outlook report, QuoIntelligence assesses the expected threat landscape for 2026, examining key developments across eCrime, malware evolution, hacktivism, and state‑sponsored activity.

North Korean Threat Actors Expand Contagious Interview Campaign With Malicious VS Code Targeting Developers | European Commission Proposes New Cybersecurity Package To Strengthen Resilience and Capabilities

VoidLink: A Modular Linux C2 Framework Targeting Cloud and Container Environments | Fundamental Disagreement Between US and Denmark Over Greenland, Europeans To Send Troops