Threat Report
How a Stolen Phone Can Spawn Phishing Attacks
Cyren Threat Researchers investigated a targeted phishing incident that started with the theft of a mobile phone. Read this report to learn the tactics, techniques, and procedures used by criminals in the real and digital worlds.
Watch the video story here.