
Threat Intelligence Snapshot: Week 19, 2024
Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations
New Ransomware Group Dubbed APT73 Shares Similarities with LockBit’s DLS | NIS2 Cybersecurity Directive Key Takeaways
Cheap Ransomware Tools Proliferating in the Underground | Chinese Espionage: New Cases In Germany, Growing Concern In Europe
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains
Large-Scale StrelaStealer Campaign Targets Europe | Russia-Ukraine Conflict Is Likely Far From End Resulting in Continued Instability
Red Teaming Malicious Use Cases for AI | Global Supply Chains Facing Growing Geopolitical Risks
QuoIntelligence analyzes Microsoft’s Patch Tuesday security update | key elements of the landmark EU’s AI Act
Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.