Threat Report

How a Stolen Phone Can Spawn Phishing Attacks

Cyren Threat Researchers investigated a targeted phishing incident that started with the theft of a mobile phone. Read this report to learn the tactics, techniques, and procedures used by criminals in the real and digital worlds.

Watch the video story here.