Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Interlock’s Early Access: Exploiting Cisco FMC vulnerabilities ahead of official disclosure

Interlock’s Early Access: Exploiting Cisco FMC vulnerabilities ahead of official disclosure

Critical Vulnerability in Cisco Secure Firewall Exploited by Interlock Group Recent observations indicate that the Interlock group has actively exploited the critical vulnerability CVE-2026-20131 in Cisco Secure Firewall Management Center (FMC) since January 26, 2026....
Rethinking routine tech: uncovering the ransomware exfiltration strategy

Rethinking routine tech: uncovering the ransomware exfiltration strategy

Exfiltration Framework Challenges Traditional Detection Strategies TL;DR Recent research highlights how data exfiltration increasingly employs legitimate tools, complicating detection efforts. The Exfiltration Framework offers a method to identify behavior indicative...
Essential steps for restoring a hacked account: Your quick recovery roadmap

Essential steps for restoring a hacked account: Your quick recovery roadmap

Cybercriminals Targeting Personal Accounts Across Multiple Platforms TL;DR Cybercriminals are increasingly targeting personal accounts on various online platforms, including social media and finance applications. Immediate action is crucial for users to retain control...
Unmasking the buyer: Navigating retail fraud in the era of agentic AI

Unmasking the buyer: Navigating retail fraud in the era of agentic AI

AI-Enabled Fraud Threatens Retail Sector Integrity The rise of agentic commerce introduces significant security threats to retailers, as detailed in research by Palo Alto Networks. The anticipated increase in AI’s role in e-commerce presents opportunities for...
Unmasking Operation GhostMail: A deep dive into Russian APT’s Zimbra XSS exploitation techniques

Unmasking Operation GhostMail: A deep dive into Russian APT’s Zimbra XSS exploitation techniques

Operation GhostMail: APT28’s Sophisticated Zero-Click Cyber-Espionage Campaign TL;DR APT28, associated with Russian cyber-espionage, has launched Operation GhostMail, exploiting a high-risk stored Cross-Site Scripting vulnerability in Zimbra Collaboration to...
Open the door wide: Why inviting attackers in can compromise your DNS security

Open the door wide: Why inviting attackers in can compromise your DNS security

Increasing Risks in Identity Security and Regional Attacks TL;DR: Recent cybersecurity trends highlight a significant shift towards identity-based attacks, where adversaries exploit multi-factor authentication to gain unauthorized access. Additionally, ongoing...
« Older Entries
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

Phone : +31 (0) 85 00 22 932

  1. Home
  2. Threat Intelligence Research

© 2026 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}