#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

28 C
Dubai
Tuesday, November 18, 2025
HomeTopics 2Phishing & Solution

Phishing & Solution

spot_imgspot_imgspot_imgspot_img

Microsoft Takes Down 338 Websites to Disrupt RaccoonO365 Phishing Empire

Microsoft has struck a major blow against one of the fastest-growing phishing operations targeting its cloud users. In a decisive move, Microsoft’s Digital Crimes...

FBI Sounds Alarm as Hackers Target Salesforce in Global Data Theft and Extortion Campaigns

Hackers are turning Salesforce, one of the world’s most widely used business platforms, into their latest playground. According to a new FBI alert, two...

Iran-Nexus Spear-Phishing Masquerades as Omani MFA to Target Global Governments

In August 2025, Dream’s Cyber Threat Intelligence (CTI) agents uncovered a sophisticated spear-phishing campaign exploiting a compromised Ministry of Foreign Affairs of Oman (MFA)...

The Cost of a Call: How Voice Phishing Campaigns Escalated into Salesforce Data Extortion

A sophisticated cybersecurity campaign leveraging voice phishing (vishing) has evolved into a high-stakes data extortion threat. Tracked as UNC6040 and UNC6240 by Google Threat...

TikTok Shop Scam “ClickTok” Unleashes SparkKitty Spyware in Global Phishing Blitz

A massive cybersecurity campaign dubbed ClickTok is targeting TikTok Shop users worldwide, combining phishing and malware to steal credentials and deploy SparkKitty spyware. First reported by CTM360...

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct China‑aligned threat actors launching spear‑phishing campaigns against Taiwanese semiconductor firms, design houses, service providers, and...

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are increasingly leveraged in sophisticated phishing campaigns. Cisco Talos’ July 2, 2025 investigation reveals how threat actors use...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img