• Clarity: Login
logo
  • Services
    • Managed Services
      • Clarity Data: Data Security
      • Clarity Defend: Detection and Response
      • Clarity Extend: Enhanced Detection and Response
      • Clarity Protect: Advanced Detection and Response
      • → Clarity Protect: OT
      • → Clarity Protect: ITDR
      • → Clarity Protect: CTEM
      • Explore our Managed Services
    • Incident Response Services
      • Incident Response Preparedness
      • Incident Response Retainer
      • Emergency MDR
    • Professional Services
      • Cloud Security
      • Cyber Resilience Assessment
      • Cyber Security Leadership
      • Identity Security Advisory
      • Offensive Security
      • Operational Technology Security
      • Security Maturity Assessments
      • Technical Advisory: Security Design and Optimisation
    • Microsoft Integration Services
      • Microsoft Security Copilot
      • Microsoft Defender XDR
      • Microsoft Defender for IoT
      • Microsoft Purview
  • Industries
    • Financial Services
    • Higher Education
    • Housing Associations
    • Professional Services
    • Public Sector
    • Private Equity
    • Manufacturing
    • Retail and Hospitality
  • Resources
    • Articles
    • Customer Case Studies
    • Events
    • Reports
    • Webinars and Videos
  • About
    • About Quorum Cyber
    • Leadership Team
    • Microsoft Partner
    • News
  • Careers
  • Contact us
  • Emergency IR
  • Search

Articles

  1. Home
  2. Articles

Our latest expert insights

Stay ahead of the curve. Be ready and resilient for whatever tomorrow brings - discover the latest thought leadership and threat intelligence articles from our expert teams.

  • Show all
  • Uncategorized
  • Insights
  • Threat Intelligence
  • People
  • Financial Services Industry
  • Higher Education
  • Private Equity
  • Professional Services
  • Public Sector
  • Microsoft
  • Clarity
  • Thought Leadership
  • Events
  • Housing Associations
  • Retail and Hospitality

May 2, 2025

What We Know About Ransomware Group Scattered Spider

Insights,Threat Intelligence,Retail and Hospitality

May 2, 2025

Five Ways Retailers can Boost Cyber Security and Protect Customer Data

Insights,Retail and Hospitality

April 30, 2025

Why Undertake a Local Government Cyber Resiliency Assessment?

Insights,Public Sector

April 30, 2025

Busting Cyber Security Myths: Incident Response Retainers versus Cyber Insurance

Insights

April 25, 2025

Critical Path Traversal Vulnerability in Commvault Command Center Innovation Release Enables Remote Code Execution

Threat Intelligence

April 23, 2025

Global Remote Desktop Freeze Issue Following February 2025 Security Update

Threat Intelligence

April 22, 2025

Cybercriminals Exploit Government Name to Spread FOG Ransomware via Phishing Attacks

Threat Intelligence

April 22, 2025

2021 SonicWall SMA 100 Series Exploit Resurfacing

Threat Intelligence

April 16, 2025

Chinese State-Sponsored Group UNC5174 Utilises Custom and Open-Source Tools in Latest Cyber Espionage Campaign

Threat Intelligence

April 16, 2025

Slopsquatting: A New Software Supply Chain Attack Exploiting AI-Generated Code Inaccuracies

Threat Intelligence

April 16, 2025

Microsoft Customers Becomes Targets for Tycoon2FA Phishing Kits

Threat Intelligence

April 16, 2025

New Ransomware Operator Mora_001 Exploits Fortinet Vulnerabilities with SuperBlack

Threat Intelligence

April 16, 2025

How to Defend Your Organisation Against Current Ransomware Trends

Insights,Threat Intelligence

April 9, 2025

Patch Tuesday April 2025

Threat Intelligence

April 4, 2025

Critical Vulnerability in Ivanti Connect Secure VPN Appliances

Threat Intelligence

April 4, 2025

CISA Adds Authentication Bypass and GitHub Action Vulnerabilities to its Known Exploited Vulnerabilities Catalogue

Threat Intelligence

April 4, 2025

CISA, FBI, and NSA Issue Joint Advisory on Fast Flux Technique Used by Cybercriminals and Nation-State Actors

Threat Intelligence

April 2, 2025

Researchers Discover New Malware Variant: CoffeeLoader

Threat Intelligence

April 2, 2025

Lucid PhaaS: Exploiting iMessage and RCS Vulnerabilities with High Success Rates

Threat Intelligence

March 31, 2025

CISA Issues Warning on RESURGE Malware Exploiting Ivanti Vulnerability

Threat Intelligence

March 26, 2025

Critical Chrome Zero-Day Vulnerability CVE-2025-2783 Exploited in Russian Cyberespionage Operations

Threat Intelligence

March 25, 2025

Threat Actor Claims Theft of Six Million Records from Oracle Cloud; Oracle Denies Breach

Threat Intelligence

March 25, 2025

Critical Security Vulnerabilities Discovered in Ingress NGINX Controller for Kubernetes

Threat Intelligence

March 24, 2025

Next.js Severe Exploit: Middleware Bypass of Authorisation Check

Threat Intelligence

March 21, 2025

Symantec Discovers New ‘Betruger’ Malware Enhancing RansomHub Ransomware Attacks

Threat Intelligence

March 19, 2025

Zero-Day Windows Shortcut Exploit Utilised in Extensive APT Campaigns

Threat Intelligence

March 19, 2025

CISA Issues Alert on New GitHub Actions Vulnerability

Threat Intelligence

March 19, 2025

Zero-Day Vulnerabilities in VMware ESXi, Workstation, and Fusion Exploited

Threat Intelligence

March 19, 2025

StilachiRAT: A New Remote Access Trojan Posing a Significant Threat

Threat Intelligence

March 19, 2025

Apache Tomcat Under Active Exploitation

Threat Intelligence

March 17, 2025

Securing the Future: Addressing Identity Compromise in a Fragmented Landscape

Insights,Thought Leadership

March 14, 2025

OBSCURE#BAT Malware Uses Fake CAPTCHA Screens to Deploy Stealthy Rootkits

Threat Intelligence

March 14, 2025

Critical PHP-CGI RCE Vulnerability Under Active Exploitation

Threat Intelligence

March 14, 2025

Critical Alert: Medusa Ransomware Threat Highlighted by FBI, CISA, and MS-ISAC

Threat Intelligence

March 13, 2025

The Biggest Cyber Threats for the Professional Services and Legal Sectors in 2025

Insights,Threat Intelligence,Professional Services

March 13, 2025

Top Cyber Security Challenges for the Public Sector in 2025

Insights,Threat Intelligence,Public Sector

March 12, 2025

Elon Musk Confirms Significant Cyber-attack on X, Hacktivist Group Dark Storm Claims Responsibility

Threat Intelligence

March 12, 2025

Patch Tuesday March 2025

Threat Intelligence

March 12, 2025

Emerging Cyber Threats in the Higher Education Sector in 2025

Insights,Threat Intelligence,Higher Education

March 12, 2025

The Key Cyber Threats Facing the Financial Services Sector in 2025

Insights,Threat Intelligence,Financial Services Industry

March 7, 2025

BadBox 2.0 Botnet Compromises Over a Million Android Devices for Ad Fraud

Threat Intelligence

March 7, 2025

New Browser Threat: Polymorphic Extensions Stealing Data

Threat Intelligence

March 6, 2025

Silk Typhoon: Chinese State-Sponsored Cyber-Espionage Group Targets IT Supply Chain

Threat Intelligence

March 6, 2025

International Women’s Day: Empowering Women in Cyber

Insights,People

March 5, 2025

Critical Alert: VMware Addresses Critical Vulnerabilities Amid Active Exploitation

Threat Intelligence

March 5, 2025

JavaGhost Exploiting Misconfigured AWS Environments for Phishing Campaigns

Threat Intelligence

March 5, 2025

CISA Adds Five New Vulnerabilities to Its Known Exploited Vulnerabilities Catalogue

Threat Intelligence

March 4, 2025

New Phishing Campaign Targets Microsoft SharePoint Using ClickFix Technique

Threat Intelligence

March 4, 2025

Black Basta and Cactus Ransomware Groups Enhance Attacks with BackConnect Malware

Threat Intelligence

March 4, 2025

Insights from Quorum Cyber’s Global Cyber Risk Outlook Report 2025 Webinar

Insights,Threat Intelligence

February 28, 2025

Check Point Research Uncovers Cyberattack Exploiting Vulnerable Truesight.sys Driver to Deploy Malware

Threat Intelligence

February 26, 2025

CISA Adds Critical Microsoft Vulnerability to Known Exploited Vulnerabilities Catalogue

Threat Intelligence

February 26, 2025

LightSpy Spyware Poses Significant Threat with Advanced Capabilities and Wide-Ranging Targets

Threat Intelligence

February 25, 2025

Massive Botnet Targets Microsoft 365 Accounts Worldwide with Password-Spraying Techniques

Threat Intelligence

February 25, 2025

Urgent CISA Alert: Critical Security Flaws in Adobe and Oracle Products Under Attack

Threat Intelligence

February 21, 2025

Astaroth 2FA: A New Phishing Kit Targeting Major Online Platforms

Threat Intelligence

February 18, 2025

Storm-2372 Launches Device Code Phishing Campaign Targeting Microsoft 365 Accounts

Threat Intelligence

UK Public Sector Threats

February 18, 2025

Cyber Risks Facing the UK’s Public Sector

Insights,Threat Intelligence,Thought Leadership

February 14, 2025

Global Cyber Risk Outlook Report 2025: What You Need to Know

Insights,Threat Intelligence

February 13, 2025

Ivanti Releases Critical Security Updates for Connect Secure, Policy Secure and Cloud Services Application

Threat Intelligence

February 13, 2025

DeepSeek App Exposes Sensitive User and Device Data Due to Lack of Encryption

Threat Intelligence

February 13, 2025

Patch Tuesday February 2025

Threat Intelligence

February 10, 2025

Zero Trust: The Future of Cyber Security

Insights,Microsoft

February 7, 2025

Google and Mozilla Release Critical Security Vulnerabilities

Threat Intelligence

February 7, 2025

Critical Auth Bypass Affecting FortiOS and FortiProxy Exploited in the Wild

Threat Intelligence

February 7, 2025

Potential Data Breach from Nominet RCE Exploit Caused by Ivanti Connect Secure Vulnerability

Threat Intelligence

February 7, 2025

SonicWall SMA 1000 Vulnerability

Threat Intelligence

February 6, 2025

Patch Tuesday January 2025

Threat Intelligence

February 5, 2025

Three Transformative Insights for Navigating the Evolving Cyber Threat Landscape

Insights

February 5, 2025

NIS2 Decoded: Three Critical Changes Reshaping Cyber Security

Insights

January 31, 2025

Banking on Security: Combatting Cyber Threats in FS&I

Financial Services Industry

January 31, 2025

CyberEd: A Higher Education Roundtable on Cyber Security

Insights,Higher Education

January 27, 2025

Proof of Concept Released for Critical RegreSSHion Vulnerability

Threat Intelligence

January 27, 2025

Critical Apache Struts File Upload Vulnerability

Threat Intelligence

January 17, 2025

Going Beyond Compliance: Building Resilience for Local Government

Public Sector

January 17, 2025

AI-Driven Security: British Government’s Plan to Boost Growth

Public Sector

January 16, 2025

Understanding Modern-Day Threat Actors

Insights,Threat Intelligence

January 14, 2025

Securing Our Schools: Understanding and Combating Cyber Threats

Insights,Higher Education

January 14, 2025

What is a Security Operations Centre? – All you Need to Know and Key Benefits

Insights

January 13, 2025

What Cyber Threats Await the World in 2025?

Insights

January 13, 2025

The Hidden Strain – Understanding CISO Burnout and its Consequences

Insights

January 10, 2025

Exploit Targets Window LDAP Vulnerability Proof-of-Concept is Released

Threat Intelligence

January 10, 2025

Ivanti Connect Secure, Policy Secure, and ZTA Gateways Vulnerabilities

Insights,Threat Intelligence

January 10, 2025

Life as a Quorum Cyber Graduate

Insights,People

January 7, 2025

Strengthening your Security Posture with Quorum Cyber’s Clarity Data Service

Insights,Clarity

December 27, 2024

What is Microsoft Security Copilot?

Insights,Microsoft

December 20, 2024

Critical Command Injection Vulnerability in BeyondTrust Remote Support and Privileged Remote Access

Threat Intelligence

December 18, 2024

How Private Equity Firms can Proactively Strengthen Cyber Security and Resilience for Portfolio Companies and Themselves

Private Equity

December 18, 2024

UK Public Sector at a Critical Juncture for Cyber Security

Public Sector

December 18, 2024

How Private Equity Firms can Proactively Strengthen Cyber Security and Resilience for Portfolio Companies and Themselves

Insights

December 14, 2024

Top Three Ways Your Organisation Can Stay Cyber-Safe this Christmas

Insights

December 11, 2024

Patch Tuesday December 2024

Insights,Threat Intelligence

November 19, 2024

Critical Vulnerabilities in VMware vCenter Server and Progress Kemp LoadMaster

Threat Intelligence

November 19, 2024

Beware of Retail Scams as Black Friday Kicks off the Festive Shopping Season

Insights,Retail and Hospitality

November 15, 2024

Cyber Risk is the Biggest Risk for Law Firms in 2024

Insights,Professional Services

ve AI-powered assistant—announcing Copilot for Security general availability.

November 14, 2024

Patch Tuesday November 2024

Threat Intelligence

November 11, 2024

Critical Cyber Security Strategies for Private Equity Firms

Insights,Private Equity

November 11, 2024

CISA Urges Immediate Action on Critical Palo Alto Networks Vulnerability Exploitation 

Threat Intelligence

November 11, 2024

Critical Cyber Security Strategies for Private Equity Firms

Private Equity

  • 1
  • 2
  • 3
  • …
  • 8
Get in touch

Talk to us today about how we can help you fortify your cyber security posture and cyber resilience

Contact us now
Contact Us
  • UK: 0800 029 1305
  • US: +1 888 346 0166
  • RoW: +44 333 444 0041
  • [email protected]
Legal
  • Privacy Policy
  • Cookie Policy
  • Site Map
  • Modern Slavery Statement 2023/24
Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

London, UK Office

Paddington Works
8 Hermitage Street
London
W2 1BE

Florida, USA Office

501 E Kennedy Blvd
Tampa, Florida
USA
33602

Florida, USA Office

501 E Kennedy Blvd
Tampa, Florida
USA
33602

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Contact Us
  • UK: 0800 029 1305
  • US: +1 888 346 0166
  • RoW: +44 333 444 0041
  • [email protected]
Address

Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

London, UK Office

Paddington Works
8 Hermitage Street
London
W2 1BE

Florida, USA Office

501 E Kennedy Blvd
Tampa
Florida
USA
33602

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Legal
  • Privacy Policy
  • Cookie Policy
  • Site Map
  • Modern Slavery Statement 2023/24
© 2025 Quorum Cyber. All rights reserved

Privacy Preference Center

Privacy Preferences

Stay ahead of the threats

Subscribing supports your organisation and the cyber community

Subscribing to the email newsletter ensures you receive a regular digest of the latest insights, exclusive content, and opportunities to connect with other professionals, all while staying informed about upcoming events and community offers.

RELACE THIS FORM WITH CAMPAIGN FORM

Download the Threat Intelligence Outlook 2024 Report

Download the UK Cyber Security Assessment Framework for Local Government document

Get in touch

Let’s discuss your cyber security requirements.

Get started on your journey and go from crisis to clarity, starting now.

Download the Global Cyber Risk Outlook Report

Want to learn more?

Contact us
Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset