Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Understanding the eScan supply chain attack: Essential insights for cybersecurity professionals

Understanding the eScan supply chain attack: Essential insights for cybersecurity professionals

Supply Chain Attack Targets eScan Antivirus Software A recent supply chain attack compromised the eScan antivirus software from MicroWorld Technologies, distributing malicious payloads through its update server. Discovered on January 20, this sophisticated attack was...
Exploiting privileged file system flaws in SCADA systems: A cybersecurity alert

Exploiting privileged file system flaws in SCADA systems: A cybersecurity alert

Critical Vulnerability Discovered in Iconics SCADA Software CVE-2025-0921 exposes serious risks for users of the Iconics Suite, a widely used SCADA system. The vulnerability can lead to denial-of-service (DoS) attacks by exploiting privileged file system operations....
Are spam and scam emails overwhelming your inbox? Discover the reasons why

Are spam and scam emails overwhelming your inbox? Discover the reasons why

Email Flood: Understanding Recent Spam Surge and Mitigation Strategies TL;DR: Recent research highlights a significant rise in spam and malicious email traffic attributed to data breaches, scam kit advancements, and selective targeting. Organizations and individuals...
Navigating the threats of personal AI agents with robust Netskope protection

Navigating the threats of personal AI agents with robust Netskope protection

Exploitation Risks of MoltBot AI Agent in Corporate Environments MoltBot, an open-source personal AI agent, presents significant security risks due to its default configuration, allowing unauthenticated remote control and privileged access to users’ systems. Netskope...
Unveiling GoBruteforcer: The role of AI-driven server defaults, vulnerable passwords, and crypto-centric strategies in modern attacks

Unveiling GoBruteforcer: The role of AI-driven server defaults, vulnerable passwords, and crypto-centric strategies in modern attacks

GoBruteforcer Botnet Targets Exposed Linux Servers with Weak Credentials GoBruteforcer, a modular botnet identified by Check Point Research, is exploiting poorly secured Linux servers, targeting services like FTP, MySQL, and phpMyAdmin through brute-forcing...
Cunning spyware campaign in Pakistan exploits fake dating app as bait

Cunning spyware campaign in Pakistan exploits fake dating app as bait

Android Spyware Campaign: Deceptive Romance Tactics Target Pakistan Users TL;DR: ESET researchers have identified a spyware campaign in Pakistan that uses a faux chat app named GhostChat, masquerading as a dating platform to harvest sensitive data from victims. The...
« Older Entries
Next Entries »

Recent Posts

  • Is the privacy of private endpoints a double-edged sword in cybersecurity?
  • Why savvy professionals still get caught in phishing traps
  • Navigating Apple Pay pitfalls: Essential tips to outsmart scams
  • Microsoft addresses critical Office zero-day vulnerability now under active exploitation
  • Navigating the Russian cyber threat landscape ahead of the 2026 Winter Olympics

Recent Comments

No comments to show.
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

  1. Home
  2. Threat Intelligence Research
  3. Page 4

© 2025 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}