Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Ransomware insights: What Q1 2026 reveals about the evolving threat landscape

May 12, 2026 | Threat Intelligence Research

Ransomware Landscape Q1 2026: Consolidation and Emerging Trends

TL;DR: The ransomware ecosystem has consolidated significantly in Q1 2026, with the top ten groups accounting for 71% of documented victims. Qilin leads as the most notable operator, while The Gentlemen has rapidly emerged as a force in the landscape.

Main Analysis: The recent report by Check Point Research reveals a significant shift in the ransomware environment, moving from fragmentation back towards consolidation. The landscape saw a marked decrease in active groups, from 85 in Q3 2025 to 71 in Q1 2026, with the top ten groups now dominating 71.1% of all reported victims. This indicates that the ransomware operation model is evolving, as larger groups absorb the talent from smaller, less established players.

During Q1 2026, data leak sites reported a total of 2,122 victims, marking the second-highest figure for Q1 on record. Notably, the emergence of prominent actors like Qilin, which alone recorded 338 victims, and The Gentlemen, which surged by 315% to land 166 victims, underscores the dynamic nature of these organizations. The Gentlemen’s unique approach, characterized by pre-existing access stockpiles and a focus outside the US, differentiates it from traditional ransomware operations.

LockBit, once a dominant force, is making a strong comeback with an increase of 106% in victims from Q4 2025, now claiming 163 victims and targeting a more global audience compared to its previous US-centric model. This shift is observed in its reduced share of US victims, indicating a strategic pivot potentially influenced by heightened law enforcement scrutiny.

Defensive Context: Organizations across various sectors need to be acutely aware of the recalibrating ransomware threat landscape, particularly those in industries known for high ransom yield, such as manufacturing and critical services. Notably, entities with exposure to FortiGate devices, given the reported exploitation of CVE-2024-55591, should prioritize understanding and managing these risks, as such vulnerabilities may impact their operational resilience.

Why This Matters: Companies in sectors heavily targeted by ransomware, especially financial institutions and healthcare providers, face increased existential risk due to the concentration of skilled operators. The renewed focus on broader geographic targets dilutes the effectiveness of traditional defense strategies, necessitating a more nuanced awareness of adversary tactics.

Defender Considerations: Given the operational trends, defenders must enhance their monitoring of emerging ransomware tactics, focusing particularly on known vulnerabilities and the actors responsible for recent spikes in activity. Understanding the infrastructure and affiliations driving these groups is crucial for effective incident response strategies.

Indicators of Compromise: The data does not specify exact IOCs, but entities should monitor for unusual access attempts, particularly relating to FortiGate devices associated with the mentioned CVE, as well as patterns of attack distinct to actors like LockBit and The Gentlemen.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles