Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Evolving threats: A deep dive into the 2025 CVE landscape and beyond

Evolving threats: A deep dive into the 2025 CVE landscape and beyond

Vulnerability Landscape Retrospective Highlights Growing Threats High volumes of software vulnerabilities persist, with significant implications for security management efforts across organizations. In a recent analysis by Cisco Talos, 2025 recorded an unprecedented...
Emerging threat: Web-based indirect prompt injection attacks detected in the wild

Emerging threat: Web-based indirect prompt injection attacks detected in the wild

Indirect Prompt Injection: An Emerging Threat to AI Systems TL;DR Researchers at Palo Alto Networks have observed a rise in indirect prompt injection (IDPI) attacks targeting large language models (LLMs) embedded in web-facing systems. These attacks use a range of...
Leveraging MDR to enhance cybersecurity resilience in educational institutions

Leveraging MDR to enhance cybersecurity resilience in educational institutions

Cybersecurity Challenges in Education and the Role of Managed Detection and Response TL;DR Educational institutions face significant cybersecurity challenges due to limited resources and the evolving threat landscape. Managed detection and response services can help...
Navigating the mobile threat landscape: What 2025 has in store for cybersecurity professionals

Navigating the mobile threat landscape: What 2025 has in store for cybersecurity professionals

Mobile Threat Report 2025 Highlights Surge in Banking Trojans and Spyware In 2025, Kaspersky highlighted a dramatic increase in cyber threats targeting mobile devices, primarily manifested in banking Trojans and spyware. The report noted over 14 million...
Covert operations and hidden threats: Unpacking APT28’s MSHTML espionage strategy

Covert operations and hidden threats: Unpacking APT28’s MSHTML espionage strategy

APT28 Exploits Zero-Day Vulnerability in Microsoft MSHTML Engine APT28, a known Russian threat actor group affiliated with military intelligence, has recently targeted governmental and defense sectors using a newly discovered zero-day vulnerability, identified as...
« Older Entries
Next Entries »
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

Phone : +31 (0) 85 00 22 932

  1. Home
  2. 2026
  3. Page 4

© 2026 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}