• Clarity: Login
logo
  • Services
    • Managed Services
      • Clarity Data: Data Security
      • Clarity Defend: Detection and Response
      • Clarity Extend: Enhanced Detection and Response
      • Clarity Protect: Advanced Detection and Response
      • → Clarity Protect: OT
      • → Clarity Protect: ITDR
      • → Clarity Protect: CTEM
      • Explore our Managed Services
    • Incident Response Services
      • Incident Response Preparedness
      • Incident Response Retainer
      • Emergency MDR
      • Brand and Credential Monitoring
    • Professional Services
      • Cloud Security
      • Cyber Resilience Assessment
      • Cyber Security Leadership
      • Identity Security Advisory
      • Offensive Security
      • Operational Technology Security
      • Security Maturity Assessments
      • Technical Advisory: Security Design and Optimisation
    • Microsoft Integration Services
      • Microsoft Security Copilot
      • Microsoft Defender XDR
      • Microsoft Defender for IoT
      • Microsoft Purview
  • Industries
    • Financial Services
    • Higher Education
    • Housing Associations
    • Professional Services
    • Public Sector
    • Private Equity
    • Manufacturing
    • Retail and Hospitality
  • Resources
    • Articles
    • Customer Case Studies
    • Events
    • Reports
    • Threat Intelligence Community
    • Webinars and Videos
  • About
    • About Quorum Cyber
    • Leadership Team
    • Microsoft Partner
    • News
  • Careers
  • Contact us
  • Emergency IR
  • Search

Articles

  1. Home
  2. Articles

Our latest expert insights

Stay ahead of the curve. Be ready and resilient for whatever tomorrow brings - discover the latest thought leadership and threat intelligence articles from our expert teams.

  • Show all
  • Uncategorized
  • Insights
  • Threat Intelligence
  • People
  • Financial Services Industry
  • Higher Education
  • Private Equity
  • Professional Services
  • Public Sector
  • Microsoft
  • Clarity
  • Thought Leadership
  • Events
  • Housing Associations
  • Retail and Hospitality

June 10, 2025

Secrets from the Frontline: Navigating Ransomware Extortion

Insights,Thought Leadership

June 10, 2025

Multiple Organisations Targeted by China-Linked Threat Actors

Threat Intelligence

June 6, 2025

Critical Cisco ISE Cloud Auth Bypass Flaw Allows Unauthenticated Access Across Deployments: CVE-2025-20286

Threat Intelligence

Quantum Computing Countdown

June 6, 2025

What do we need to action before Quantum Computing transforms 2030?

Insights,Thought Leadership

June 4, 2025

Sophisticated Malware Campaign Exploits Fake DocuSign and Gitcode Sites

Threat Intelligence

June 4, 2025

Critical Vulnerability in HPE StoreOnce: CVE-2025-37093

Threat Intelligence

June 3, 2025

Apache HTTP Server Vulnerability Enables HTTP Request Smuggling

Threat Intelligence

June 3, 2025

Critical Cisco IOS XE Vulnerability

Threat Intelligence

May 30, 2025

OneDrive Vulnerability Exposes Millions to Unauthorised Access

Threat Intelligence

Quantum Computing Countdown

May 29, 2025

The Quantum Computing Countdown

Insights,Thought Leadership

May 27, 2025

Discovery of Malicious npm and VS Code Packages

Threat Intelligence

May 23, 2025

Quorum Cyber Uncovers Two Variants of Remote Access Trojan Malware: NodeSnake

Insights,Threat Intelligence

May 22, 2025

The Essentials of Crisis Communications in the Face of a Cyber-attack

Insights

May 22, 2025

New Phishing Attack Distributes More_eggs Malware Disguised as CVs

Threat Intelligence

May 22, 2025

Understanding the DragonForce ‘Cartel’: The Cybercriminals Targeting Retailers with Ransomware

Insights,Threat Intelligence

May 22, 2025

Hazy Hawk Exploits DNS Vulnerabilities to Target Major Organisations

Threat Intelligence

May 20, 2025

Malicious PyPI Packages Targeting Instagram and TikTok APIs

Threat Intelligence

May 20, 2025

Critical Vulnerability Affects Over 10,000 WordPress Sites Using Eventin Plugin

Threat Intelligence

May 16, 2025

New Malware Threat Discovered by Zscaler ThreatLabz

Threat Intelligence

May 16, 2025

Critical Vulnerability in Samsung’s MagicINFO Server Fixed

Threat Intelligence

May 16, 2025

Unlocking Cyber Security Excellence: Insider Tips from a Leading CISO

Insights

May 15, 2025

Quorum Cyber Showcases Microsoft Security Expertise at GISEC in Dubai

Insights

May 14, 2025

Fortinet Fixes Critical Zero-Day Vulnerability CVE-2025-32756 in FortiVoice

Threat Intelligence

May 14, 2025

Patch Tuesday May 2025

Threat Intelligence

May 13, 2025

PupkinStealer: A .NET-Based Malware Targeting Sensitive User Data

Threat Intelligence

May 13, 2025

Emerging Cyber Threat: Fake AI Tools Spreading Noodlophile Malware

Threat Intelligence

May 9, 2025

Alleviating the Pressure: Supporting CISOs to Reduce Stress and Avoid Burn-out

Insights

May 9, 2025

A CISO’s Guide to Securing Cyber Security Budget: Speaking the Board’s Language

Insights

May 2, 2025

What We Know About Ransomware Group Scattered Spider

Insights,Threat Intelligence,Retail and Hospitality

May 2, 2025

Five Ways Retailers can Boost Cyber Security and Protect Customer Data

Insights,Retail and Hospitality

April 30, 2025

Why Undertake a Local Government Cyber Resiliency Assessment?

Insights,Public Sector

April 30, 2025

Busting Cyber Security Myths: Incident Response Retainers versus Cyber Insurance

Insights

April 25, 2025

Critical Path Traversal Vulnerability in Commvault Command Center Innovation Release Enables Remote Code Execution

Threat Intelligence

April 23, 2025

Global Remote Desktop Freeze Issue Following February 2025 Security Update

Threat Intelligence

April 22, 2025

Cybercriminals Exploit Government Name to Spread FOG Ransomware via Phishing Attacks

Threat Intelligence

Cyber Security for Quantum Computing

April 22, 2025

2021 SonicWall SMA 100 Series Exploit Resurfacing

Threat Intelligence

April 16, 2025

Chinese State-Sponsored Group UNC5174 Utilises Custom and Open-Source Tools in Latest Cyber Espionage Campaign

Threat Intelligence

April 16, 2025

Slopsquatting: A New Software Supply Chain Attack Exploiting AI-Generated Code Inaccuracies

Threat Intelligence

Quorum Cyber_The Quantum Computing Countdown

April 16, 2025

Microsoft Customers Becomes Targets for Tycoon2FA Phishing Kits

Threat Intelligence

Cyber Security for Quantum Computing

April 16, 2025

New Ransomware Operator Mora_001 Exploits Fortinet Vulnerabilities with SuperBlack

Threat Intelligence

April 16, 2025

How to Defend Your Organisation Against Current Ransomware Trends

Insights,Threat Intelligence

April 9, 2025

Patch Tuesday April 2025

Threat Intelligence

April 4, 2025

Critical Vulnerability in Ivanti Connect Secure VPN Appliances

Threat Intelligence

April 4, 2025

CISA Adds Authentication Bypass and GitHub Action Vulnerabilities to its Known Exploited Vulnerabilities Catalogue

Threat Intelligence

April 4, 2025

CISA, FBI, and NSA Issue Joint Advisory on Fast Flux Technique Used by Cybercriminals and Nation-State Actors

Threat Intelligence

April 2, 2025

Researchers Discover New Malware Variant: CoffeeLoader

Threat Intelligence

April 2, 2025

Lucid PhaaS: Exploiting iMessage and RCS Vulnerabilities with High Success Rates

Threat Intelligence

March 31, 2025

CISA Issues Warning on RESURGE Malware Exploiting Ivanti Vulnerability

Threat Intelligence

March 26, 2025

Critical Chrome Zero-Day Vulnerability CVE-2025-2783 Exploited in Russian Cyberespionage Operations

Threat Intelligence

March 25, 2025

Threat Actor Claims Theft of Six Million Records from Oracle Cloud; Oracle Denies Breach

Threat Intelligence

March 25, 2025

Critical Security Vulnerabilities Discovered in Ingress NGINX Controller for Kubernetes

Threat Intelligence

March 24, 2025

Next.js Severe Exploit: Middleware Bypass of Authorisation Check

Threat Intelligence

March 21, 2025

Symantec Discovers New ‘Betruger’ Malware Enhancing RansomHub Ransomware Attacks

Threat Intelligence

March 19, 2025

Zero-Day Windows Shortcut Exploit Utilised in Extensive APT Campaigns

Threat Intelligence

March 19, 2025

CISA Issues Alert on New GitHub Actions Vulnerability

Threat Intelligence

March 19, 2025

Zero-Day Vulnerabilities in VMware ESXi, Workstation, and Fusion Exploited

Threat Intelligence

March 19, 2025

StilachiRAT: A New Remote Access Trojan Posing a Significant Threat

Threat Intelligence

March 19, 2025

Apache Tomcat Under Active Exploitation

Threat Intelligence

March 17, 2025

Securing the Future: Addressing Identity Compromise in a Fragmented Landscape

Insights,Thought Leadership

March 14, 2025

OBSCURE#BAT Malware Uses Fake CAPTCHA Screens to Deploy Stealthy Rootkits

Threat Intelligence

March 14, 2025

Critical PHP-CGI RCE Vulnerability Under Active Exploitation

Threat Intelligence

March 14, 2025

Critical Alert: Medusa Ransomware Threat Highlighted by FBI, CISA, and MS-ISAC

Threat Intelligence

March 13, 2025

The Biggest Cyber Threats for the Professional Services and Legal Sectors in 2025

Insights,Threat Intelligence,Professional Services

March 13, 2025

Top Cyber Security Challenges for the Public Sector in 2025

Insights,Threat Intelligence,Public Sector

March 12, 2025

Elon Musk Confirms Significant Cyber-attack on X, Hacktivist Group Dark Storm Claims Responsibility

Threat Intelligence

March 12, 2025

Patch Tuesday March 2025

Threat Intelligence

March 12, 2025

Emerging Cyber Threats in the Higher Education Sector in 2025

Insights,Threat Intelligence,Higher Education

March 12, 2025

The Key Cyber Threats Facing the Financial Services Sector in 2025

Insights,Threat Intelligence,Financial Services Industry

March 7, 2025

BadBox 2.0 Botnet Compromises Over a Million Android Devices for Ad Fraud

Threat Intelligence

March 7, 2025

New Browser Threat: Polymorphic Extensions Stealing Data

Threat Intelligence

March 6, 2025

Silk Typhoon: Chinese State-Sponsored Cyber-Espionage Group Targets IT Supply Chain

Threat Intelligence

March 6, 2025

International Women’s Day: Empowering Women in Cyber

Insights,People

March 5, 2025

Critical Alert: VMware Addresses Critical Vulnerabilities Amid Active Exploitation

Threat Intelligence

March 5, 2025

JavaGhost Exploiting Misconfigured AWS Environments for Phishing Campaigns

Threat Intelligence

March 5, 2025

CISA Adds Five New Vulnerabilities to Its Known Exploited Vulnerabilities Catalogue

Threat Intelligence

March 4, 2025

New Phishing Campaign Targets Microsoft SharePoint Using ClickFix Technique

Threat Intelligence

March 4, 2025

Black Basta and Cactus Ransomware Groups Enhance Attacks with BackConnect Malware

Threat Intelligence

March 4, 2025

Insights from Quorum Cyber’s Global Cyber Risk Outlook Report 2025 Webinar

Insights,Threat Intelligence

February 28, 2025

Check Point Research Uncovers Cyberattack Exploiting Vulnerable Truesight.sys Driver to Deploy Malware

Threat Intelligence

February 26, 2025

CISA Adds Critical Microsoft Vulnerability to Known Exploited Vulnerabilities Catalogue

Threat Intelligence

February 26, 2025

LightSpy Spyware Poses Significant Threat with Advanced Capabilities and Wide-Ranging Targets

Threat Intelligence

February 25, 2025

Massive Botnet Targets Microsoft 365 Accounts Worldwide with Password-Spraying Techniques

Threat Intelligence

Quorum Cyber_The Quantum Computing Countdown

February 25, 2025

Urgent CISA Alert: Critical Security Flaws in Adobe and Oracle Products Under Attack

Threat Intelligence

February 21, 2025

Astaroth 2FA: A New Phishing Kit Targeting Major Online Platforms

Threat Intelligence

February 18, 2025

Storm-2372 Launches Device Code Phishing Campaign Targeting Microsoft 365 Accounts

Threat Intelligence

UK Public Sector Threats

February 18, 2025

Cyber Risks Facing the UK’s Public Sector

Insights,Threat Intelligence,Thought Leadership

February 14, 2025

Global Cyber Risk Outlook Report 2025: What You Need to Know

Insights,Threat Intelligence

February 13, 2025

Ivanti Releases Critical Security Updates for Connect Secure, Policy Secure and Cloud Services Application

Threat Intelligence

February 13, 2025

DeepSeek App Exposes Sensitive User and Device Data Due to Lack of Encryption

Threat Intelligence

February 13, 2025

Patch Tuesday February 2025

Threat Intelligence

February 10, 2025

Zero Trust: The Future of Cyber Security

Insights,Microsoft

February 7, 2025

Google and Mozilla Release Critical Security Vulnerabilities

Threat Intelligence

February 7, 2025

Critical Auth Bypass Affecting FortiOS and FortiProxy Exploited in the Wild

Threat Intelligence

February 7, 2025

Potential Data Breach from Nominet RCE Exploit Caused by Ivanti Connect Secure Vulnerability

Threat Intelligence

February 7, 2025

SonicWall SMA 1000 Vulnerability

Threat Intelligence

February 6, 2025

Patch Tuesday January 2025

Threat Intelligence

February 5, 2025

Three Transformative Insights for Navigating the Evolving Cyber Threat Landscape

Insights

February 5, 2025

NIS2 Decoded: Three Critical Changes Reshaping Cyber Security

Insights

January 31, 2025

Banking on Security: Combatting Cyber Threats in FS&I

Financial Services Industry

  • 1
  • 2
  • 3
  • …
  • 8

Want to know more?

Get in touch to speak to our experts

Ready to talk?
Contact Us
  • UK: 0800 029 1305
  • US: +1 888 346 0166
  • RoW: +44 333 444 0041
  • [email protected]
Legal
  • Privacy Policy
  • Cookie Policy
  • Site Map
  • Modern Slavery Statement 2023/24
Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

London, UK Office

Paddington Works
8 Hermitage Street
London
W2 1BE

Florida, USA Office

501 E Kennedy Blvd
Tampa, Florida
USA
33602

Florida, USA Office

501 E Kennedy Blvd
Tampa, Florida
USA
33602

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Contact Us
  • UK: 0800 029 1305
  • US: +1 888 346 0166
  • RoW: +44 333 444 0041
  • [email protected]
Address

Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

London, UK Office

Paddington Works
8 Hermitage Street
London
W2 1BE

Florida, USA Office

501 E Kennedy Blvd
Tampa
Florida
USA
33602

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Legal
  • Privacy Policy
  • Cookie Policy
  • Site Map
  • Modern Slavery Statement 2023/24
© 2025 Quorum Cyber. All rights reserved

Privacy Preference Center

Privacy Preferences

Stay ahead of the threats

Subscribing to the email newsletter ensures you receive a regular digest of the latest insights, exclusive content, and opportunities to connect with other professionals, all while staying informed about upcoming events and community offers.

Download the Threat Intelligence Outlook 2024 Report

Download the UK Cyber Security Assessment Framework for Local Government document

Get in touch

Let’s discuss your cyber security requirements.

Get started on your journey and go from crisis to clarity, starting now.

Download the Global Cyber Risk Outlook Report

Want to learn more?

Contact us
Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset