The Q4 2025 Phishing Simulation Roundup reveals phishing emails containing company names see highest click rates, while domain spoofing appears in nearly 90% of top-clicked...
Morphing Meerkat spoofs over 100 brands and steals credentials Infoblox Threat Intel has uncovered a highly sophisticated Phishing-as-a-Service (PhaaS) platform that poses a significant threat...
After Phishing, Ransomware Surges as Second Most Common Cybersecurity Concern in KSA Sophos has released findings from its KSA Cybersecurity Awareness survey 2024, revealing, 74%...
Standard phishing delivery techniques were combined with a novel method of phishing, targeting Android and iOS users via PWAs, and on Android also via WebAPKs. ...
In a novel attack technique, cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight...
HP Inc. issued its quarterly HP Wolf Security Threat Insights Report, showing attackers are relying on open redirects, overdue invoice lures, and Living-off-the-Land (LotL) techniques...
By: Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
Report underscores that email is the most exploited threat vector, phishing remains borderless and attackers are increasingly impersonating trusted name brands. Cloudflare, Inc. (NYSE: NET), the...
By dissecting the eight strategic phases of modern intrusions, the report enables security teams to shift from a reactive defense posture to proactive, context-aware resilience....
Meriam ElOuazzani, Vice President for Middle East, Turkey, and Africa at Censys, on leadership, breaking barriers, growth, and the evolving role of women in technology....