The Q4 2025 Phishing Simulation Roundup reveals phishing emails containing company names see highest click rates, while domain spoofing appears in nearly 90% of top-clicked...
Morphing Meerkat spoofs over 100 brands and steals credentials Infoblox Threat Intel has uncovered a highly sophisticated Phishing-as-a-Service (PhaaS) platform that poses a significant threat...
After Phishing, Ransomware Surges as Second Most Common Cybersecurity Concern in KSA Sophos has released findings from its KSA Cybersecurity Awareness survey 2024, revealing, 74%...
Standard phishing delivery techniques were combined with a novel method of phishing, targeting Android and iOS users via PWAs, and on Android also via WebAPKs. ...
In a novel attack technique, cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight...
HP Inc. issued its quarterly HP Wolf Security Threat Insights Report, showing attackers are relying on open redirects, overdue invoice lures, and Living-off-the-Land (LotL) techniques...
By: Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
Report underscores that email is the most exploited threat vector, phishing remains borderless and attackers are increasingly impersonating trusted name brands. Cloudflare, Inc. (NYSE: NET), the...
Meriam ElOuazzani, Vice President for Middle East, Turkey, and Africa at Censys, on leadership, breaking barriers, growth, and the evolving role of women in technology....
Group-IB launched its High-Tech Crime Trends Report 2026, revealing that supply chain attacks have become the dominant force reshaping the global cyber threat landscape. For...