{"id":52796,"date":"2023-07-14T16:45:14","date_gmt":"2023-07-14T16:45:14","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-global\/brand-impersonation-middle-east-africa-growth"},"modified":"2023-07-14T16:45:14","modified_gmt":"2023-07-14T16:45:14","slug":"brand-impersonation-scams-in-middle-east-africa-see-massive-growth","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/","title":{"rendered":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The number of detected fake and scam websites pertaining to be reputable brands from the Middle East and Africa increased by 135% last year.<\/p>\n<p>Defined as the number of instances in which a brand&#8217;s image and logo were appropriated, the <a href=\"https:\/\/www.group-ib.com\/resources\/research-hub\/drp-report-2023\/\" target=\"_blank\" rel=\"noopener\">research by Group-IB<\/a> discovered an increase by 162% of <a href=\"https:\/\/www.darkreading.com\/edge-articles\/why-cisos-should-care-about-brand-impersonation-scam-sites\" target=\"_blank\" rel=\"noopener\">brand impersonation&nbsp;scam detections<\/a> overall in the region. As opposed to <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/holiday-spam-phishing-campaigns-challenge-retailers\" target=\"_blank\" rel=\"noopener\">phishing, which results in the theft of personal information<\/a> in a way that might not be known by the victim, the &#8220;scams&#8221; category refers to any attempt by a cybercriminal to deceive a victim into voluntarily handing over money or sensitive information.<\/p>\n<p>Sharef Hlal, head of Group-IB\u2019s Digital Risk Protection Analytics Team, says that&nbsp;the Middle East and Africa&#8217;s scam uptick was lower than in the Asia-Pacific region, where this figure was up 211% in 2022.<\/p>\n<h2 class=\"regular-text\">Where the Scams Live<\/h2>\n<p>It was determined that scammers are using a vast amount of domains and social media accounts to not only reach a greater number of potential victims but also evade counteraction. In particular, the <a href=\"https:\/\/www.group-ib.com\/blog\/classiscam\/\" target=\"_blank\" rel=\"noopener\">scam-as-a-service affiliate program known as Classiscam<\/a> has seen notable growth. To date, Group-IB has identified 1,366 Classiscam groups, and found them <a href=\"https:\/\/www.darkreading.com\/edge-articles\/what-cisos-can-do-about-brand-impersonation-scam-sites\" target=\"_blank\" rel=\"noopener\">emulating 251 brands from 79 countries<\/a>. Group-IB estimates that the financial damage from this scam scheme alone is at least $64 million.<\/p>\n<p>Also, there has been a rapid uptick in the number of scam resources hosted on the .tk domain, the firm found. The .tk domain, which doesn&#8217;t charge to register websites, is&nbsp;for&nbsp;Tokelau, a territory of New Zealand. It&nbsp;accounts for 38.8% of all scam resources examined by Group-IB in the second half of 2022.&nbsp;<\/p>\n<p>Hlal says the bulk of the activity consists of fake websites that are then linked to on social media. &#8220;Scammers can create a large amount of fake accounts that can publish sponsored posts to raise potential reach,&#8221; he notes.&nbsp;&nbsp;<\/p>\n<p>Group-IB found that 92% of scams that impersonated MEA companies leveraged social media, up from 80% in 2021.<\/p>\n<h2 class=\"regular-text\">Which Verticals Are Affected?<\/h2>\n<p>In total, Group-IB detected 304% more scam resources globally that utilized the name and likeness of legitimate brands in 2022 compared with the preceding year. Brands from across the entire Middle East and Africa region were the targets of scammers, with finance, telecommunications and logistics the three most targeted sectors, along with&nbsp;oil and gas.<\/p>\n<p>&#8220;The financial sector was the most targeted industry, as 74.2% of intellectual property violations, such as the illegal use of trademarks, misrepresentation of brand partnerships, scam advertising, fake social media and messenger accounts, and fake brand applications targeted companies from this vertical,&#8221; Hlal says.<\/p>\n<p>Group-IB&#8217;s &#8220;<a href=\"https:\/\/www.group-ib.com\/resources\/research-hub\/gasa-2022\/\" target=\"_blank\" rel=\"noopener\">2022 Global State of Scams Report<\/a>,&#8221; published by the Global Anti Scam Alliance and ScamAdviser in collaboration with Group-IB, previously revealed that in total, scams caused more than $55 billion in damages last year globally.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/brand-impersonation-middle-east-africa-growth\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Middle East and Africa region saw a whopping 135% increase in scams over the past year, with finance, telecommunications, and logistics the most-targeted sectors.Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/brand-impersonation-middle-east-africa-growth\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-52796","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-14T16:45:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth\",\"datePublished\":\"2023-07-14T16:45:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltcc6c8ca2af93e4fb\\\/64b146e3f971933b4fcaef7e\\\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/\",\"name\":\"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltcc6c8ca2af93e4fb\\\/64b146e3f971933b4fcaef7e\\\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\",\"datePublished\":\"2023-07-14T16:45:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltcc6c8ca2af93e4fb\\\/64b146e3f971933b4fcaef7e\\\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltcc6c8ca2af93e4fb\\\/64b146e3f971933b4fcaef7e\\\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/","og_locale":"en_US","og_type":"article","og_title":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-14T16:45:14+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth","datePublished":"2023-07-14T16:45:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/","url":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/","name":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg","datePublished":"2023-07-14T16:45:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltcc6c8ca2af93e4fb\/64b146e3f971933b4fcaef7e\/scam_keyboard_Chih-Chung_Johnny_Chang_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/brand-impersonation-scams-in-middle-east-africa-see-massive-growth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Brand Impersonation Scams in Middle East &amp; Africa See Massive Growth"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52796"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52796\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}