Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Warning: Recruitment scam masquerading as Palo Alto Networks hiring team

Mar 25, 2026 | Threat Intelligence Research

Phishing Campaigns Exploiting Recruitment Process

TL;DR
A series of targeted phishing attacks, tracked by Unit 42, impersonate Palo Alto Networks talent acquisition staff to exploit job seekers, particularly senior-level professionals. These scams create an artificial urgency around resume submission, demanding fees for supposed services that guarantee job placements.

Main Analysis
Unit 42 has reported an ongoing phishing campaign leveraging the guise of Palo Alto Networks’ recruitment process. Attackers utilize scraped LinkedIn data to engage senior professionals through convincingly authentic emails. The first contact often includes flattering language, personalized references, and legitimate company logos, all designed to build rapport and gain trust. Central to these attacks is a fabricated obstacle: the attackers claim that the candidate’s resume does not comply with applicant tracking system standards, thus necessitating assistance for a fee.

The attackers create pressure by fabricating a review process, where time constraints are imposed to hasten the candidate’s response. The offerings vary in pricing, with services described as “executive ATS alignment” and “end-to-end executive rewrite,” demanding payments ranging from $400 to $800. Visually illustrative examples of the phishing emails highlight the effectiveness of the social engineering tactics employed, wherein urgency and fear of losing an opportunity compel candidates to comply quickly.

Defensive Context
Organizations, particularly those in the tech sector, should prioritize awareness of these phishing tactics, especially those targeting high-level talent. Senior professionals responsible for hiring or recruitment must be informed about these threats as they may become targets or inadvertently help to propagate them. The layered approach of using urgency within this phishing scheme indicates a sophisticated understanding of recruitment workflows which can influence job seeker behavior.

Why This Matters
The impact is particularly significant for senior professionals who may be more vulnerable due to their job status and urgency to secure new opportunities. The financial implications may result in not only loss of direct payments but also personal information exploitation when job seekers engage with dubious entities.

Defender Considerations
While specific organizational responses were not outlined in the report, it is imperative for companies to educate employees on recognizing signs of phishing attempts. It may also be prudent to implement training for job seekers entering the recruitment process, highlighting how to verify messaging authenticity before engaging further.

Indicators of Compromise (IOCs)
Relevant IOCs include email addresses associated with the scams such as:

Additional identifiers include specific LinkedIn handles and a phone number linked to the activity:

  • +2349131397140 (Nigeria)

Those working in recruitment or job placement should remain vigilant against such scams that exploit the nuances of the hiring process as they evolve.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles