
Threat Intelligence Snapshot: Week 28, 2024
Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation

TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs

Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering

Scattered Spider Targets SaaS, Ivanti and VMware CVEs | Cyber Insurance Claims Hit Record, NATO To Increase Vigilance On Russian

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Grandoreiro Trojan Reemerges Targeting More Than 1,500 Banks Globally | Analyzing Impact Of EU Decision To Use Russian Frozen Assets

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations
Try searching our blog

New Wave of Vishing Campaigns Against Identity Providers Targets Okta, Microsoft, Google, and Cryptocurrency Platforms | France To Ditch US Platforms Microsoft Teams, Zoom For Sovereign Platform Citing Security Concerns
In this outlook report, QuoIntelligence assesses the expected threat landscape for 2026, examining key developments across eCrime, malware evolution, hacktivism, and state‑sponsored activity.

North Korean Threat Actors Expand Contagious Interview Campaign With Malicious VS Code Targeting Developers | European Commission Proposes New Cybersecurity Package To Strengthen Resilience and Capabilities

VoidLink: A Modular Linux C2 Framework Targeting Cloud and Container Environments | Fundamental Disagreement Between US and Denmark Over Greenland, Europeans To Send Troops