Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Understanding the Notepad++ supply chain attack: A detailed analysis

Understanding the Notepad++ supply chain attack: A detailed analysis

Notepad++ Supply Chain Attack: A Comprehensive Overview TL;DR: A security breach affecting Notepad++ update infrastructure allowed attackers to deploy malicious payloads from June to December 2025. Various victim organizations, including government and financial...
Unpacking the MongoDB flaw: A deep dive into CVE-2025-14847 and its implications for cybersecurity

Unpacking the MongoDB flaw: A deep dive into CVE-2025-14847 and its implications for cybersecurity

MongoDB Vulnerability Exposes Sensitive Data to Attackers Unauthenticated MongoDB vulnerability discovered (CVE-2025-14847) allows attackers to leak sensitive data, prompting urgent security measures. Active exploitation has been confirmed, affecting around 146,000...
Unveiling a groundbreaking method for identifying cloud threat actor activities

Unveiling a groundbreaking method for identifying cloud threat actor activities

Distinct Alert Patterns Offer New Detection Methods for Cloud Threats TL;DR: Researchers at Unit 42 have identified unique alert patterns related to two distinct threat actor groups—Muddled Libra and Silk Typhoon—targeting cloud environments. By associating cloud...
Behind the scenes of cyber warfare: Exposing the shadow campaigns of global espionage

Behind the scenes of cyber warfare: Exposing the shadow campaigns of global espionage

New Cyberespionage Group TGR-STA-1030 Engages in Global Reconnaissance In a significant discovery, Palo Alto Networks’ Unit 42 has identified a state-aligned cyberespionage group dubbed TGR-STA-1030, linked to extensive espionage activities across 37 countries. The...
Exploring Stan Ghouls attacks in Russia and Uzbekistan: The role of NetSupport RAT and implications for IoT security

Exploring Stan Ghouls attacks in Russia and Uzbekistan: The role of NetSupport RAT and implications for IoT security

Targeted Cyberattacks by Stan Ghouls Impact Multiple Sectors in Central Asia Recent investigations by Kaspersky reveal that the cybercriminal group Stan Ghouls (also known as Bloody Wolf) has methodically targeted organizations in Central Asia, particularly in...
« Older Entries
Next Entries »
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

Phone : +31 (0) 85 00 22 932

  1. Home
  2. 2026
  3. February
  4. Page 11

© 2026 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}