Threat Report

How a Stolen Phone Can Spawn Phishing Attacks

Cyren Threat Researchers investigated a targeted phishing incident that started with the theft of a mobile phone. Read this report to learn the tactics, techniques, and procedures used by criminals in the real and digital worlds.

Cyren protects 1.3 billion users against emerging threats