Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Phishing campaign targeting Native American tribes underscores ongoing exploitation trends in cybersecurity

Phishing campaign targeting Native American tribes underscores ongoing exploitation trends in cybersecurity

Threat Actors Shift Focus to Exploiting Public-Facing Applications TL;DR: Cisco Talos Incident Response notes a significant trend in cyberattacks, with public-facing applications being targeted in nearly 40% of engagements, alongside a worrying rise in phishing...
Navigating the digital landscape: Essential insights for parents on children and chatbots

Navigating the digital landscape: Essential insights for parents on children and chatbots

AI Chatbots Pose Risks to Children’s Emotional and Online Safety Many children are increasingly using AI chatbots like ChatGPT, raising concerns about their safety and emotional well-being. A recent UK study indicates nearly 64% of youngsters engage with these...
Unpacking DynoWiper: A deep dive into its technical intricacies and origin tracing

Unpacking DynoWiper: A deep dive into its technical intricacies and origin tracing

ESET Uncovers DynoWiper Malware Targeting Polish Energy Sector ESET researchers have identified a new data-wiping malware named DynoWiper that recently targeted an energy company in Poland. This attack shares similarities with previous incidents involving Sandworm and...
SolarWinds rolls out crucial security patches to tackle critical Web Help Desk vulnerabilities

SolarWinds rolls out crucial security patches to tackle critical Web Help Desk vulnerabilities

SolarWinds Addresses Critical Vulnerabilities in Web Help Desk Software Multiple critical vulnerabilities identified in SolarWinds’ Web Help Desk (WHD) require urgent patching, affecting a wide range of sectors including enterprise, healthcare, and government....
Emerging persistence techniques and localized strategies in cybersecurity

Emerging persistence techniques and localized strategies in cybersecurity

Targeted Attacks on IIS Servers by UAT-8099 Uncovered by Cisco Talos Recent research from Cisco Talos reveals a new campaign conducted by the group UAT-8099, focusing on vulnerable Internet Information Services (IIS) servers, particularly in Thailand and Vietnam. This...
From SSO to SOS: The impact of CVE-2026-24858 on the security of your Fortinet devices

From SSO to SOS: The impact of CVE-2026-24858 on the security of your Fortinet devices

Critical Flaw in Fortinet’s Products Enables Authentication Bypass Organizations using Fortinet products must act urgently to address the critical authentication bypass vulnerability, CVE-2026-24858. This flaw, scored at 9.4 on the CVSS, is actively being exploited...
« Older Entries
Next Entries »

Recent Posts

  • Why savvy professionals still get caught in phishing traps
  • Navigating Apple Pay pitfalls: Essential tips to outsmart scams
  • Microsoft addresses critical Office zero-day vulnerability now under active exploitation
  • Navigating the Russian cyber threat landscape ahead of the 2026 Winter Olympics
  • Uncovering vulnerabilities in Foxit, Epic Games Store, and MedDreams: A cybersecurity deep dive

Recent Comments

No comments to show.
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

  1. Home
  2. Threat Intelligence Research
  3. Page 2

© 2025 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}