
Threat Intelligence Snapshot: Week 35, 2024
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force
Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development
EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks
Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation
TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs
Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering
Try searching our blog
IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela Oil Buyers Threatened
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and Emerging Technologies
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Affiliate marketing drives traffic and conversions in competitive industries like iGaming, but unethical techniques are on the rise. QuoIntelligence’s investigation uncovered a large-scale campaign using AI-generated content, automation, fake social media accounts, and Black Hat SEO to manipulate rankings and deceive users.