
Weekly Intelligence Snapshot – Week 21, 2023
G7 Summit: Leaders prioritize supply chain resilience and fair trade practices.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
G7 Summit: Leaders prioritize supply chain resilience and fair trade practices.
Officials in multiple European countries were targeted by a newly discovered malicious firmware implant called “Horse Shell”.
The National Security Agency (NSA) and partner agencies have identified the infrastructure for Snake malware, a Russian cyberespionage tool, in
QuoIntelligence observed a new backdoor called “Durtmovoy” that is currently in development by “Durt Team”, a newly observed Russian threat
We track a Phishing campaign targeting SCADA system providers in the DACH region that delivers the Remcos Trojan. We analyze
Ransomware groups and APTs are resorting to Living-off-the-Land Binaries (LOLBINs) — legitimate software and tools preinstalled on infected systems.
As the use of ChatGPT rises, we analyze the current AI regulatory frameworks.
Kaspersky reports that some victims compromised in the SupplyChain attack against 3CX’s Desktop Application VoIP software also had the Gopuram
Vulnerability CVE-2023-23397 is being exploited to target private and public defense sector organizations. We analyze the campaign and also examine
QuoIntelligence outlines the main features of two EU legislation proposals, the Net Zero Industry Act and Critical Raw Materials Act,
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.