
The Quo Files: The Proxy Warfare, Unmasking China’s Externalized Cyber Capabilities
The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They
Try searching our blog

Russian-Speaking eCrime Threat Actor Leverages Commercial AI Services to Compromise Over 600 FortiGate Devices | US Supreme Court Strikes Down Trump’s Global Tariffs

UNC6201 Exploiting Zero-day in Dell RecoverPoint to Achieve Persistent Access | Wave of Sabotage Acts Target Italian Railway Network Amid Winter Olympics

Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape | EU Launches 20th Russia Sanctions Package

APT28 Targeting Central and Eastern Europe through CVE‑2026‑21509 Exploitation | UK Opens First Investigations Over Breach Of Cyber Sanctions