
The Quo Files: The Proxy Warfare, Unmasking China’s Externalized Cyber Capabilities
The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance