Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unlocking the secrets of passwordless authentication mechanisms

Mar 26, 2026 | Threat Intelligence Research

Understanding Threats to Passwordless Authentication: Focus on Google Authenticator

TL;DR
An analysis by Palo Alto Networks reveals critical vulnerabilities in the Google Authenticator’s implementation of passwordless authentication, especially concerning the cloud-based handling of passkeys. The findings indicate an expansive attack surface that attackers can exploit, particularly in environments that rely on synchronized access across devices.

Main Analysis
Palo Alto Networks conducted an in-depth evaluation of passwordless authentication mechanisms, focusing primarily on Google Authenticator. Their research highlights that attackers often do not exploit theoretical vulnerabilities; instead, they target real-world implementations that intersect with usability and architecture challenges. Specifically, the analysis of Google’s cloud-backed passkey system reveals that sensitive cryptographic operations occur within Google’s cloud environment, which may introduce potential attack vectors not previously discussed in public forums.

The architecture of Google’s passkey system relies on various components including the Trusted Platform Module (TPM) for secure key management and cloud applications for syncing passkeys. The onboarding process, which synchronizes user passkeys across devices, necessitates establishing trust between the users’ devices and the cloud authenticator, involving the generation of multiple key pairs. This synchronization poses inherent risks, particularly as attackers may leverage the cloud if its security is compromised.

Detailed examination of the system’s flow demonstrates how the passkey creation and validation processes function within Chrome, utilizing commands sent to the cloud authenticator through a secure WebSocket connection. Each synchronization and authentication operation is backed by hardware security elements, yet the reliance on cloud-hosted operations could be a point of failure. The secure communication protocol employed ensures that any request retains cryptographic integrity, but the potential for remote exploitation raises significant concerns about the robustness of these defenses.

Defensive Context
Organizations using Google Authenticator for passwordless authentication must critically assess their exposure. The interplay between cloud authentication and device synchronization can increase vulnerability, particularly for environments processing sensitive data. Enterprises that prioritize seamless access and user experience may not fully recognize the security implications associated with these convenient integrations.

Why This Matters
Enterprises that implement passwordless systems like Google Authenticator need to understand that they are susceptible to risks associated with cloud security. If Google’s implementation flaws or vulnerabilities are exploited, attackers could potentially hijack accounts through synchronized credentials, compromising entire systems.

Defender Considerations
Organizations must continuously monitor network traffic for unusual or unauthorized access patterns. Understanding the flow of data and command operations between devices and the cloud authenticator can help in detecting potential breaches.

Indicators of Compromise (IOCs)
While the article did not specify concrete IOCs such as IP addresses or file hashes, awareness of suspicious activity related to the domain enclave.ua5v.com could provide insights into potential threats. Regular audits of device authentication settings and configurations may also highlight anomalies that warrant further investigation.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles