
Threat Intelligence Snapshot: Week 38, 2024
Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems

Researchers Unintentionally Gained Administrative Access To Mobi WHOIS Server After Purchasing Decommissioned Domain For Vulnerability Testing | Poland Thwarts Cyber

new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide

BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting

RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force

Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development

EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks
Try searching our blog

New Wave of Vishing Campaigns Against Identity Providers Targets Okta, Microsoft, Google, and Cryptocurrency Platforms | France To Ditch US Platforms Microsoft Teams, Zoom For Sovereign Platform Citing Security Concerns
In this outlook report, QuoIntelligence assesses the expected threat landscape for 2026, examining key developments across eCrime, malware evolution, hacktivism, and state‑sponsored activity.

North Korean Threat Actors Expand Contagious Interview Campaign With Malicious VS Code Targeting Developers | European Commission Proposes New Cybersecurity Package To Strengthen Resilience and Capabilities

VoidLink: A Modular Linux C2 Framework Targeting Cloud and Container Environments | Fundamental Disagreement Between US and Denmark Over Greenland, Europeans To Send Troops