Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Silver Dragon strikes: Cyberattacks on organizations across Southeast Asia and Europe

Silver Dragon strikes: Cyberattacks on organizations across Southeast Asia and Europe

Emergence of Silver Dragon: APT Group Targeting Europe and Southeast Asia TL;DR: Check Point Research has identified Silver Dragon, a sophisticated APT group closely linked to Chinese-nexus APT41, targeting high-profile organizations in Europe and Southeast Asia....
The convergence of Iranian IP camera exploits and physical warfare strategies in the Middle East

The convergence of Iranian IP camera exploits and physical warfare strategies in the Middle East

Intensified Targeting of IP Cameras by Iranian Threat Actors in the Middle East Conflict During the recent hostilities in the Middle East, Check Point Research has identified increased malicious activity targeting IP cameras from specific manufacturers. This campaign...
What Talos reveals about the evolving cybersecurity landscape in the Middle East

What Talos reveals about the evolving cybersecurity landscape in the Middle East

Cisco Talos Observes Cyber Activities Amid Middle East Conflict As the conflict in the Middle East unfolds, Cisco Talos is monitoring the associated cyber threat landscape, noting current incidents such as web defacements and small-scale distributed denial-of-service...
Cybersecurity alert: March 2026 marks a surge in cyber threats linked to Iran

Cybersecurity alert: March 2026 marks a surge in cyber threats linked to Iran

Iranian Cyber Activity Escalates Amid Regional Conflict TL;DR Following a military escalation involving the United States and Israel, Iranian cyber activity has surged, primarily driven by hacktivist groups. While state-aligned threats may be temporarily hindered by...
Web shell attacks surge against 900+ FreePBX systems: Unmasking the INJ3CTOR3 and its EncystPHP strategy

Web shell attacks surge against 900+ FreePBX systems: Unmasking the INJ3CTOR3 and its EncystPHP strategy

Exploitation of Vulnerable FreePBX Systems Increases Threat Landscape Cybercriminals are targeting misconfigured and unpatched VoIP infrastructures, leading to compromises of over 900 Sangoma FreePBX systems. This trend, identified by The Shadowserver Foundation,...
« Older Entries
Next Entries »
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

Phone : +31 (0) 85 00 22 932

  1. Home
  2. 2026
  3. Page 5

© 2026 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}