{"id":46889,"date":"2026-05-01T07:50:02","date_gmt":"2026-05-01T04:50:02","guid":{"rendered":"https:\/\/homeland-news.net\/?p=46889"},"modified":"2026-05-01T07:50:02","modified_gmt":"2026-05-01T04:50:02","slug":"perpetrators-of-cyber-threats-employ-sophisticated-tactics-reliant-on-digital-technologies-to-engage-in-impersonation","status":"publish","type":"post","link":"https:\/\/homeland-news.net\/?p=46889","title":{"rendered":"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation."},"content":{"rendered":"<p style=\"text-align: center\"><a href=\"http:\/\/FBi\">FBi<\/a><\/p>\n<p style=\"text-align: left\">New York &#8211; Rashad Alkhader -Homeland News &#8211; From News &#8211; FBI<\/p>\n<p style=\"text-align: left\">Cyber threat actors are using sophisticated, cyber-enabled tactics to impersonate legitimate businesses to hijack freight, steal high-value shipments, and reroute deliveries, resulting in a surge in strategic cargo theft. The threat actors target US transportation and logistics sectors, gaining unauthorized access to computer systems via spoofed emails, fake URLs, and compromised carrier accounts. In 2025, estimated cargo theft losses in the US and Canada surged to nearly $725 million, a 60% increase from 2024.<\/p>\n<p style=\"text-align: left\">Read the #FBI #PSA to learn more about how the scheme works and how you can protect yourself and your business \ud83d\udc49 https:\/\/www.ic3.gov\/PSA\/2026\/PSA260430<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.ic3.gov\/PSA\/2026\/PSA260430\">https:\/\/www.ic3.gov\/PSA\/2026\/PSA260430<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FBi New York &#8211; Rashad Alkhader -Homeland News &#8211; From News &#8211; FBI Cyber threat actors are using sophisticated, cyber-enabled tactics to impersonate legitimate businesses to hijack freight, steal high-value shipments, and reroute deliveries, resulting in a surge in strategic cargo theft. The threat actors target US transportation and logistics sectors, gaining unauthorized access to &hellip;<\/p>\n","protected":false},"author":2,"featured_media":46890,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[29],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation. - \u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631<\/title>\n<meta name=\"description\" content=\"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631 Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/homeland-news.net\/?p=46889\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation. - \u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631\" \/>\n<meta property=\"og:description\" content=\"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631 Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/homeland-news.net\/?p=46889\" \/>\n<meta property=\"og:site_name\" content=\"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/homelandnewsnet\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T04:50:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@homelandnewsne1\" \/>\n<meta name=\"twitter:site\" content=\"@homelandnewsne1\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Aaron\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/homeland-news.net\/#website\",\"url\":\"https:\/\/homeland-news.net\/\",\"name\":\"\\u0639\\u064a\\u0646 \\u0627\\u062e\\u0628\\u0627\\u0631 \\u0627\\u0644\\u0648\\u0637\\u0646 \\u0627\\u0644\\u062d\\u0631\",\"description\":\"\\u0645\\u0634\\u0631\\u0648\\u0639 \\u0625\\u0639\\u0644\\u0627\\u0645 \\u0625\\u0644\\u0643\\u062a\\u0631\\u0648\\u0646\\u064a \\u0645\\u0633\\u062a\\u0642\\u0644\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/homeland-news.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ar\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/homeland-news.net\/?p=46889#primaryimage\",\"inLanguage\":\"ar\",\"url\":\"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg\",\"contentUrl\":\"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg\",\"width\":1080,\"height\":1080},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/homeland-news.net\/?p=46889#webpage\",\"url\":\"https:\/\/homeland-news.net\/?p=46889\",\"name\":\"Perpetrators of cyber threats employ sophisticated tactics\\u2014reliant on digital technologies\\u2014to engage in impersonation. - \\u0639\\u064a\\u0646 \\u0627\\u062e\\u0628\\u0627\\u0631 \\u0627\\u0644\\u0648\\u0637\\u0646 \\u0627\\u0644\\u062d\\u0631\",\"isPartOf\":{\"@id\":\"https:\/\/homeland-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/homeland-news.net\/?p=46889#primaryimage\"},\"datePublished\":\"2026-05-01T04:50:02+00:00\",\"dateModified\":\"2026-05-01T04:50:02+00:00\",\"author\":{\"@id\":\"https:\/\/homeland-news.net\/#\/schema\/person\/66536d08d591ca92e399dd56753471a8\"},\"description\":\"\\u0639\\u064a\\u0646 \\u0627\\u062e\\u0628\\u0627\\u0631 \\u0627\\u0644\\u0648\\u0637\\u0646 \\u0627\\u0644\\u062d\\u0631 Perpetrators of cyber threats employ sophisticated tactics\\u2014reliant on digital technologies\\u2014to engage in impersonation.\",\"breadcrumb\":{\"@id\":\"https:\/\/homeland-news.net\/?p=46889#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/homeland-news.net\/?p=46889\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/homeland-news.net\/?p=46889#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\\u0627\\u0644\\u0631\\u0626\\u064a\\u0633\\u064a\\u0629\",\"item\":\"https:\/\/homeland-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Perpetrators of cyber threats employ sophisticated tactics\\u2014reliant on digital technologies\\u2014to engage in impersonation.\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/homeland-news.net\/#\/schema\/person\/66536d08d591ca92e399dd56753471a8\",\"name\":\"David Aaron\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/homeland-news.net\/#personlogo\",\"inLanguage\":\"ar\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62dd29dea31947e84dcf5916fc18b29b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/62dd29dea31947e84dcf5916fc18b29b?s=96&d=mm&r=g\",\"caption\":\"David Aaron\"},\"url\":\"https:\/\/homeland-news.net\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation. - \u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631","description":"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631 Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/homeland-news.net\/?p=46889","og_locale":"ar_AR","og_type":"article","og_title":"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation. - \u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631","og_description":"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631 Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation.","og_url":"https:\/\/homeland-news.net\/?p=46889","og_site_name":"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631","article_publisher":"https:\/\/www.facebook.com\/homelandnewsnet","article_published_time":"2026-05-01T04:50:02+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@homelandnewsne1","twitter_site":"@homelandnewsne1","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"David Aaron","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/homeland-news.net\/#website","url":"https:\/\/homeland-news.net\/","name":"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631","description":"\u0645\u0634\u0631\u0648\u0639 \u0625\u0639\u0644\u0627\u0645 \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u0645\u0633\u062a\u0642\u0644","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/homeland-news.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ar"},{"@type":"ImageObject","@id":"https:\/\/homeland-news.net\/?p=46889#primaryimage","inLanguage":"ar","url":"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg","contentUrl":"https:\/\/homeland-news.net\/wp-content\/uploads\/2026\/05\/IMG_4184.jpeg","width":1080,"height":1080},{"@type":"WebPage","@id":"https:\/\/homeland-news.net\/?p=46889#webpage","url":"https:\/\/homeland-news.net\/?p=46889","name":"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation. - \u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631","isPartOf":{"@id":"https:\/\/homeland-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/homeland-news.net\/?p=46889#primaryimage"},"datePublished":"2026-05-01T04:50:02+00:00","dateModified":"2026-05-01T04:50:02+00:00","author":{"@id":"https:\/\/homeland-news.net\/#\/schema\/person\/66536d08d591ca92e399dd56753471a8"},"description":"\u0639\u064a\u0646 \u0627\u062e\u0628\u0627\u0631 \u0627\u0644\u0648\u0637\u0646 \u0627\u0644\u062d\u0631 Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation.","breadcrumb":{"@id":"https:\/\/homeland-news.net\/?p=46889#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/homeland-news.net\/?p=46889"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/homeland-news.net\/?p=46889#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629","item":"https:\/\/homeland-news.net\/"},{"@type":"ListItem","position":2,"name":"Perpetrators of cyber threats employ sophisticated tactics\u2014reliant on digital technologies\u2014to engage in impersonation."}]},{"@type":"Person","@id":"https:\/\/homeland-news.net\/#\/schema\/person\/66536d08d591ca92e399dd56753471a8","name":"David Aaron","image":{"@type":"ImageObject","@id":"https:\/\/homeland-news.net\/#personlogo","inLanguage":"ar","url":"https:\/\/secure.gravatar.com\/avatar\/62dd29dea31947e84dcf5916fc18b29b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62dd29dea31947e84dcf5916fc18b29b?s=96&d=mm&r=g","caption":"David Aaron"},"url":"https:\/\/homeland-news.net\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/posts\/46889"}],"collection":[{"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/homeland-news.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46889"}],"version-history":[{"count":1,"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/posts\/46889\/revisions"}],"predecessor-version":[{"id":46891,"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/posts\/46889\/revisions\/46891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/homeland-news.net\/index.php?rest_route=\/wp\/v2\/media\/46890"}],"wp:attachment":[{"href":"https:\/\/homeland-news.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/homeland-news.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/homeland-news.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}