Threat Report

How a Stolen Phone Can Spawn Phishing Attacks

Cyren Threat Researchers investigated a targeted phishing incident that started with the theft of a mobile phone. Read this report to learn the tactics, techniques, and procedures used by criminals in the real and digital worlds.

Watch the video story here.

Cyren protects 1.3 billion users against emerging threats