Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Unpacking the attempts to exploit CVE-2023-33538: What cybersecurity experts need to know

Unpacking the attempts to exploit CVE-2023-33538: What cybersecurity experts need to know

Exploitation Attempts of IoT Vulnerability CVE-2023-33538 in TP-Link Routers TL;DR Active exploitation attempts have been observed targeting CVE-2023-33538, a vulnerability affecting outdated TP-Link router models. Attackers aim to leverage this weakness to deploy...
Dissecting Storm-1175 and Medusa ransomware: A deep dive into a swift multi-exploit attack

Dissecting Storm-1175 and Medusa ransomware: A deep dive into a swift multi-exploit attack

Ransomware Group Storm-1175 Accelerates Attack Timelines TL;DR The Storm-1175 threat actor, noted by Microsoft Threat Intelligence, is rapidly deploying Medusa ransomware, often within 24 hours of initial compromise. Their tactics involve leveraging newly disclosed...
Industrial cybersecurity insights: Q4 2025 threat landscape analysis

Industrial cybersecurity insights: Q4 2025 threat landscape analysis

Declining Cybersecurity Landscape in ICS Environments The latest findings by Kaspersky reveal a notable decline in the percentage of industrial control system (ICS) computers successfully blocking malicious activities over the past three years. As of Q4 2025, only...
Inside CVE-2026-34621: Unpacking the actively exploited vulnerability in Adobe Acrobat Reader

Inside CVE-2026-34621: Unpacking the actively exploited vulnerability in Adobe Acrobat Reader

Critical Vulnerability Identified in Adobe Acrobat Reader Adobe has issued urgent security updates to remediate a significant vulnerability in Adobe Acrobat Reader, identified as CVE-2026-34621. This flaw, with a CVSS score of 8.6, is being actively exploited and...
Microsoft’s April 2026 Patch Tuesday tackles two zero-days and 167 vulnerabilities: Here’s what you need to know

Microsoft’s April 2026 Patch Tuesday tackles two zero-days and 167 vulnerabilities: Here’s what you need to know

April 2026 Patch Tuesday Addresses Critical Microsoft Vulnerabilities TL;DR This month’s Microsoft security update has patched 167 vulnerabilities, including two zero-day flaws, one of which is actively exploited. The vulnerabilities span a range of products,...
« Older Entries
Next Entries »
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

Phone : +31 (0) 85 00 22 932

  1. Home
  2. 2026
  3. Page 8

© 2026 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}