Q-Feeds logo
  • Products & Services
    • Cyber Threat Intelligence (CTI) Feeds
      • Firewall Integrations
        • Fortinet
        • Palo Alto
        • Sophos
        • OPNSense
        • Other firewalls
      • SIEM Integrations
        • Splunk
        • Microsoft Sentinel
        • Other SIEMs
    • Threat Intelligence Portal (TIP)
      • Darkweb Monitoring
      • Threat Lookup
      • External Attack Surface Management (EASM)
      • Vulnerability Scanner
      • Brand Protection
    • TAXII Feeds & Server software
    • Implementation
  • Solutions
    • Enrich my SIEM
    • Enrich my firewall
    • Prevent Phishing
    • Achieve Compliancy
  • Pricing
  • Company
    • About
    • News and Updates
    • Publications
    • Become a reseller
    • Contact
  • Support
    • My account
    • Downloads & Manuals
    • Knowledge base
    • Get free access
Label with EU stars, 'Made in Europe' text.
~
Unveiling VoidLink: A deep dive into the cloud-native malware framework

Unveiling VoidLink: A deep dive into the cloud-native malware framework

VoidLink: Evolving Linux Malware Framework for Cloud Environments TL;DR: Check Point Research has uncovered VoidLink, a sophisticated modular malware framework targeting Linux systems with a particular focus on cloud infrastructure. Its advanced capabilities for...
Unveiling Sicarii Ransomware: Debunking the myths and revealing the truths

Unveiling Sicarii Ransomware: Debunking the myths and revealing the truths

New Ransomware Group Sicarii Emerges with Ideological Motives Sicarii, a recently identified Ransomware-as-a-Service (RaaS), has emerged as a unique player in the cybercrime landscape, focusing on a distinct ideological narrative. This group, discovered by Check Point...
Exploring the 2026 Cybersecurity landscape: Insights from Check Point Research

Exploring the 2026 Cybersecurity landscape: Insights from Check Point Research

AI-Powered Cyber Threat Landscape Drives New Risks and Strategies TL;DR: Check Point Research’s Cyber Security Report 2026 highlights the increasing use of AI in cyber attacks, shifting ransomware tactics, and the rising risk from unmonitored devices. Organizations...
Harnessing LLMs for real-time phishing JavaScript generation in cybersecurity

Harnessing LLMs for real-time phishing JavaScript generation in cybersecurity

Seamless Phishing: New Attack Leverages Generative AI for Runtime Code Assembly TL;DR: Researchers from Palo Alto Networks demonstrate a novel attack using generative AI to create dynamic phishing pages by generating malicious JavaScript in real-time within a...
VoidLink: Unveiling the dawn of AI-driven malware attacks in cybersecurity

VoidLink: Unveiling the dawn of AI-driven malware attacks in cybersecurity

AI-Driven Malware VoidLink Signals Shift in Cyber Threat Landscape Emerging AI technology has enabled the creation of advanced malware, with VoidLink being the first well-documented example of an AI-generated framework developed primarily by a single individual. Check...
Uniting forces: Celebrating teamwork in the fight against cyber threats

Uniting forces: Celebrating teamwork in the fight against cyber threats

Collective Defense: Nine Years of Progress at Cyber Threat Alliance The Cyber Threat Alliance (CTA) has transitioned from a nascent idea in 2014 to a cornerstone of global cybersecurity in only nine years. Once a realm of competitive secrecy, the landscape of threat...
« Older Entries
Next Entries »

Recent Posts

  • Is the privacy of private endpoints a double-edged sword in cybersecurity?
  • Why savvy professionals still get caught in phishing traps
  • Navigating Apple Pay pitfalls: Essential tips to outsmart scams
  • Microsoft addresses critical Office zero-day vulnerability now under active exploitation
  • Navigating the Russian cyber threat landscape ahead of the 2026 Winter Olympics

Recent Comments

No comments to show.
logo

Quick Links

Pricing

Firewall integrations

Enrich SIEM solution

Knowledge Center

Darkweb Monitoring

Site Info

Terms and Conditions

EULA

Privacy Policy

Cookies Settings

Sitemap

About

About us

Contact us

News and Press

Q-Feeds

Oude Amersfoortseweg 43
1213 AB Hilversum
The Netherlands

(KVK) CoC Reg. number: 94910774

  1. Home
  2. Threat Intelligence Research
  3. Page 5

© 2025 Q-Feeds. All Rights Reserved. 

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}