
Weekly Intelligence Snapshot – Week 23
This week we provide analysis into IndustrialSpy and their encryption software, which they recently leveraged in cyber operations.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

This week we provide analysis into IndustrialSpy and their encryption software, which they recently leveraged in cyber operations.

Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,

Quointelligence reported on the Gamaredon group activity characterized by the use of SFX archives to deliver #malware. In this weekly,

In this Weekly we report on how a threat actor, possibly Russian, is targeting users in Germany by using information

In this weekly we investigate the emerging threat of NodePacketManager (NPM) becoming an attack vector for supply chains and the

QuoIntelligence is tracking a campaign where the threat actors are using the remote template injection to deliver an espionage implant

This week we cover our observations of #Emotet development, including differences in #TTPs observed in recent samples. We also cover

This week, the QuoIntelligence research team observed a campaign of the Gamaredon group, where SFX archives are used to deliver

This week, QuoIntelligence reveals our internal investigation findings about an ongoing phishing campaign delivering the banking trojan known as Gozi

This week we report on the ongoing conflict in Ukraine, possibly resulting in a longer second phase of the invasion.
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal