Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

How Phishers Abuse Hypertext Transfer Protocol Secure (HTTPS) Protocol

by

Security Research & Analysis

What is the first thing that comes to mind when we see sites using HTTPS protocol? Subconsciously we tend to trust these sites presuming that all that we see and/or enter there is checked, secured, and verified.

Phishing on Adobe Spark

by

Security Research & Analysis

Threat actors are always on the lookout for inconspicuous ways to execute malicious attacks. One such tactic that has become common is the use of legitimate services as part of phishing campaigns.

Ransomware Attacks Are Here to Stay

by

Ransomware

Following the highly publicized (and successful) $4M+ ransom of Colonial Pipeline, attacks like these will only get more popular.

SolarMarker Backdoor Pretends to be Legit PDFescape Installer

by

The modified installer of legit "PDFescape Desktop Installer" app looks like this:

Dissecting a UnionBank Phishing Campaign

by

We have been seeing email notifications about login attempts to UnionBank online accounts, prompting users to reset their password if they found the login attempts were suspicious.

Fake DocuSign Download Page Leads to Hentai Onichan Ransomware

by

Security Research & Analysis

We recently received samples that we suspected were “phishy” in nature, but after analyzing the email attachment a severe threat was exposed.