The report finds a seismic shift in the attack vectors utilized to conduct phishing attacks, including touchpoints outside of traditional email communication such as calendar...
The Q4 2025 Phishing Simulation Roundup reveals phishing emails containing company names see highest click rates, while domain spoofing appears in nearly 90% of top-clicked...
Morphing Meerkat spoofs over 100 brands and steals credentials Infoblox Threat Intel has uncovered a highly sophisticated Phishing-as-a-Service (PhaaS) platform that poses a significant threat...
After Phishing, Ransomware Surges as Second Most Common Cybersecurity Concern in KSA Sophos has released findings from its KSA Cybersecurity Awareness survey 2024, revealing, 74%...
Standard phishing delivery techniques were combined with a novel method of phishing, targeting Android and iOS users via PWAs, and on Android also via WebAPKs. ...
In a novel attack technique, cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight...
HP Inc. issued its quarterly HP Wolf Security Threat Insights Report, showing attackers are relying on open redirects, overdue invoice lures, and Living-off-the-Land (LotL) techniques...
By: Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
Report underscores that email is the most exploited threat vector, phishing remains borderless and attackers are increasingly impersonating trusted name brands. Cloudflare, Inc. (NYSE: NET), the...