CxO Trail
Advertisement
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • CxO Security Insights
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Data-Driven Cyber Watch
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Kaspersky Reports 5x Surge in QR Phishing

    Kaspersky Reports 5x Surge in QR Phishing

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

    The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

    Heritage, Identity, and the Hidden Risk of Digital Mimicry

    Heritage, Identity, and the Hidden Risk of Digital Mimicry

    Sophos Report Reveals Falling Encryption Rates Mask a Surge in Extortion-Only Tactics

    Sophos Report Reveals Falling Encryption Rates Mask a Surge in Extortion-Only Tactics

    Experian Forecast: AI Takes Center Stage as the Major Threat to Cybersecurity in 2026

    Experian Forecast: AI Takes Center Stage as the Major Threat to Cybersecurity in 2026

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

    Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

    AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

    AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    SentinelOne Launches AI-Native Platform on Google Cloud in Saudi Arabia

    SentinelOne Launches AI-Native Platform on Google Cloud in Saudi Arabia

    KNOT Technologies Secures $1M to Rebuild Global Ticketing Infrastructure

    KNOT Technologies Secures $1M to Rebuild Global Ticketing Infrastructure

    One Identity Manager 10.0: Transforming Identity Governance with AI and Automation

    One Identity Manager 10.0: Transforming Identity Governance with AI and Automation

    Omnix and Eagle Point Software Partner to Upskill the GCC’s Digital Construction Workforce

    Omnix and Eagle Point Software Partner to Upskill the GCC’s Digital Construction Workforce

    The 1% Reality Check for AI-Driven Identity Security

    The 1% Reality Check for AI-Driven Identity Security

    BMC Helix Named a Leader in 2025 Forrester Wave™ for Enterprise Service Management

    BMC Helix Named a Leader in 2025 Forrester Wave™ for Enterprise Service Management

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • CxO Security Insights
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Data-Driven Cyber Watch
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Kaspersky Reports 5x Surge in QR Phishing

    Kaspersky Reports 5x Surge in QR Phishing

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

    The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

    Heritage, Identity, and the Hidden Risk of Digital Mimicry

    Heritage, Identity, and the Hidden Risk of Digital Mimicry

    Sophos Report Reveals Falling Encryption Rates Mask a Surge in Extortion-Only Tactics

    Sophos Report Reveals Falling Encryption Rates Mask a Surge in Extortion-Only Tactics

    Experian Forecast: AI Takes Center Stage as the Major Threat to Cybersecurity in 2026

    Experian Forecast: AI Takes Center Stage as the Major Threat to Cybersecurity in 2026

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

    Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

    AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

    AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    SentinelOne Launches AI-Native Platform on Google Cloud in Saudi Arabia

    SentinelOne Launches AI-Native Platform on Google Cloud in Saudi Arabia

    KNOT Technologies Secures $1M to Rebuild Global Ticketing Infrastructure

    KNOT Technologies Secures $1M to Rebuild Global Ticketing Infrastructure

    One Identity Manager 10.0: Transforming Identity Governance with AI and Automation

    One Identity Manager 10.0: Transforming Identity Governance with AI and Automation

    Omnix and Eagle Point Software Partner to Upskill the GCC’s Digital Construction Workforce

    Omnix and Eagle Point Software Partner to Upskill the GCC’s Digital Construction Workforce

    The 1% Reality Check for AI-Driven Identity Security

    The 1% Reality Check for AI-Driven Identity Security

    BMC Helix Named a Leader in 2025 Forrester Wave™ for Enterprise Service Management

    BMC Helix Named a Leader in 2025 Forrester Wave™ for Enterprise Service Management

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
CxO Trail
No Result
View All Result

Kaspersky Reports 5x Surge in QR Phishing

Anabel Emekene by Anabel Emekene
January 24, 2026
in Cyber Security, CxO Security Insights, Cybersecurity Reports
Reading Time: 3 mins read
0
Kaspersky Reports 5x Surge in QR Phishing

Kaspersky Reports 5x Surge in QR Phishing

Cybercriminals are rapidly shifting toward QR Code Phishing as their preferred method for delivering malicious links. According to recent data from Kaspersky, the second half of 2025 saw an unprecedented spike in these attacks:

August 2025: 46,969 detections.

November 2025: 249,723 detections.

A staggering fivefold increase in just four months.

The surge is driven by the fact that QR codes are remarkably effective at bypassing legacy security layers. Unlike traditional URLs, which basic email filters can easily scan, QR codes act as a black box for many protective solutions.

  • Attackers frequently hide QR codes within PDF attachments. This double-masking technique makes it harder for automated scanners to find the malicious link.
  • Scanning a QR code typically shifts the victim from their protected work PC to a personal mobile device. Smartphones often lack the robust endpoint security found on corporate laptops, making them a soft target for credential theft.
  • Creating a malicious QR code is nearly free, yet it provides a sophisticated way to hide malicious infrastructure from text-based detection.

Attackers are exploiting routine business communication to lower the victim’s guard. The most frequent lures identified in 2025 include:

  • Fake login pages are designed to steal corporate credentials.
  • Urgent requests for employees to sign vacation schedules or view termination lists.
  • PDF invoices that include both a QR code and a phone number. If the user calls to cancel the fake charge, they are met by a live social engineer.

“Malicious QR codes have evolved into one of the most effective phishing tools, particularly when hidden in PDF attachments or disguised as legitimate business communications like HR updates. The explosive growth in November 2025 highlights how attackers are capitalizing on this low-cost evasion technique to target employees on mobile devices, where protection is often minimal.” — Roman Dedenok, Anti-Spam Expert at Kaspersky

Kaspersky recommends a two-pronged defense strategy to counter the rise of quishing in 2026:

  1. Advanced Gateway Protection: Deploying solutions like Kaspersky Security for Mail Server that use optical character recognition (OCR) and advanced image analysis to see and block malicious codes before they reach the inbox.
  2. Continuous Awareness Training: Educating employees to be skeptical of any QR code that arrives via unsolicited email, especially those hidden inside attachments or claiming to be from HR/Finance.

Tags: Quishing Attack Statistics
Previous Post

Network International & Saudi Sudanese Bank to Modernize Sudan’s Payment Infrastructure

Next Post

Network International & Saudi Sudanese Bank to Modernize Sudan’s Payment Infrastructure

Anabel Emekene

Anabel Emekene

Next Post
Network International & Saudi Sudanese Bank to Modernize Sudan’s Payment Infrastructure

Network International & Saudi Sudanese Bank to Modernize Sudan’s Payment Infrastructure

  • Trending
  • Latest
Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

October 31, 2025
George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

July 31, 2025
Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

August 5, 2025
CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

September 8, 2025
Why Data Centers Are the New Anchor for Africa’s Power Market

Why Data Centers Are the New Anchor for Africa’s Power Market

January 31, 2026
Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

January 29, 2026
AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

January 27, 2026
Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

January 26, 2026

Recent News

Why Data Centers Are the New Anchor for Africa’s Power Market

Why Data Centers Are the New Anchor for Africa’s Power Market

January 31, 2026
Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

Dell Technologies Research: AI Momentum Builds in the UAE, Unlocking Opportunities for Skills and Scale

January 29, 2026
AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

AfricAI Becomes the Exclusive Gateway for Advanced Robotics in Africa

January 27, 2026
Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

January 26, 2026
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Email us: editorial@cxotrail.com

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

🧠 Stay Ahead in Cybersecurity & AI

Get Africa’s top C-level insights delivered monthly. Free, sharp, and on point.

No Result
View All Result
  • About Us
  • Advertise with Us
  • AI + Cybersecurity
  • AI Governance & Policy
  • Artificial Intelligence
  • CISO & Cyber Leadership
  • Contact Us
  • Cyber Governance & Risk
  • Cyber Visionaries
  • Cyber Visionaries | Africa
  • Data Privacy & Ethics
  • Emerging AI Talent & Startups
  • Emerging Cyber Voices
  • Gitex Nigeria
  • Home
  • Magazine
  • Magazines
  • Privacy Policy
  • Women in AI
  • Women in Cyber

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.