Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Stay vigilant: Strategies for safeguarding your security and privacy while using smart glasses

May 12, 2026 | Threat Intelligence Research

Security and Privacy Risks of Smart Glasses

TL;DR

The resurgence of smart glasses, capable of recording and analyzing surroundings, presents significant privacy and security concerns for both users and bystanders. The potential for misuse includes unauthorized surveillance and data theft through various attack vectors.

Main Analysis

Phil Muncaster highlights the risks associated with the latest generation of smart glasses, which are more sophisticated and inconspicuous compared to earlier models. These devices empower users to stealthily capture videos and images, raising serious concerns regarding individual privacy. Notably, research from Harvard University indicates that streaming video from smart glasses can facilitate identity recognition using AI algorithms, creating opportunities for malicious users to stalk or harass individuals without their consent.

The discussed privacy issues extend beyond violation of personal space; they also introduce significant security risks. Users inadvertently sharing sensitive information with cloud-based AIs, such as PINs or account credentials, may find themselves at risk of fraud or identity theft. Furthermore, the dark possibility exists where unauthorized individuals exploit gathered data for purposes like phishing attacks or account takeovers, with the threat exacerbated by the potential for shoulder surfing.

In addition to privacy breaches, conventional hacking methods pose serious threats to smart glasses’ ecosystems. These can include exploiting operating systems, hijacking communication with paired devices, and using social engineering tactics such as malicious QR codes. These vulnerabilities offer pathways for attackers to compromise the devices, facilitating data theft or harmful surveillance.

Defensive Context

Organizations and individuals interacting with or around smart glasses should be aware of their potential risks. This is particularly relevant in environments where sensitive information is frequently exchanged, such as financial institutions or crowded public places. Uninformed users may carry the risks of data exposure and unauthorized surveillance, while businesses might face reputational damage and compliance issues if customer privacy is compromised.

Why This Matters

The risks posed by smart glasses are of particular concern in settings with a higher likelihood of encountered sensitive data, especially in public places like ATMs or crowded transit systems. Individuals and organizations should recognize that the presence of these devices can lead to significant security ramifications.

Defender Considerations

To mitigate risks, wearers are advised to update firmware, use strong passwords, and limit data sharing with AI platforms. They should also ensure companion applications are downloaded from trusted sources. Users should remain vigilant about their environments, especially in public spaces, and take proactive steps to secure their data.

Indicators of Compromise (IOCs)

No specific indicators of compromise were identified in the research.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles