Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Disconnect to enhance your cybersecurity code quality

May 10, 2026 | Threat Intelligence Research

Expansion of Threat Intelligence Capabilities in Scam Operations

TL;DR
Cisco Talos has enhanced its threat intelligence by tracking phone numbers as critical indicators of compromise in scam emails. This focus on telephony infrastructure allows security teams to better detect and mitigate organized scam operations.

Main Analysis
Cisco Talos has recently expanded its capabilities to monitor phone numbers as vital indicators of compromise in the context of Telephone-Oriented Attack Delivery (TOAD) campaigns. These campaigns utilize API-driven VoIP numbers, enabling attackers to conduct high-volume, low-cost operations. The research demonstrates a pattern where these malicious actors frequently rotate through sequential phone number blocks, employing cooling-off periods, and reusing the same numbers across different lures and impersonated brands to evade detection.

By clustering these phone numbers, organizations can uncover a broader network of fraudulent activities. This is crucial since traditional monitoring of sender email addresses proves ineffective against these dynamic threat actors. The strategic reuse of phone numbers across multiple documents and impersonations acts as an operational anchor, allowing security teams a new pathway to dismantle these types of operations before victims unknowingly disclose sensitive information.

Engaging actively with this telephony-focused approach enables defenders to prioritize real-time reputation monitoring. This would assist in identifying and flagging infrastructure that is at a higher risk of being linked to malicious activities. The article emphasizes that adapting to this change can provide a significant advantage in the ongoing battle against sophisticated scam networks.

Defensive Context
Organizations, especially those prone to phishing and scam calls, need to be particularly attentive to these emerging trends. Industries that rely heavily on customer interactions through phone channels, such as finance or retail, stand to benefit from focusing on phone number monitoring as part of their fraud detection strategies. Conversely, low-contact sectors like manufacturing may find this risk less relevant.

Why This Matters
The impact of these findings extends to organizations with exposure to financial fraud and data breaches. Businesses that handle confidential customer data, particularly those that might interact with scam calls, are at an increased risk from these evolving tactics. Failing to adapt could lead to financial losses and reputational damage.

Defender Considerations
Organizations should examine their existing frameworks for identifying and addressing fraud linked to telephony, specifically focusing on how to cluster activities around common phone numbers. Incorporating real-time monitoring tools, like those mentioned in the article, would further enhance their ability to detect and respond to emerging threats.

No specific indicators of compromise were detailed in the article; therefore, this section has been omitted.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles