Select Page

Cyren Security Blog

Featured Post

Latest Posts

11 Types of Social Engineering Attacks

What is social engineering? Social engineering attacks are the manipulation of individuals to the point that they give up confidential information. The type of information these attackers may seek varies, but when individuals or employees are targeted, they more often...

Phishing Targets Phantom Wallet

The Solana Phantom Wallet by Kervin Alintanahin Phantom is a browser based crypto wallet where you can store, send, receive, stake and exchange tokens in the Solana blockchain. With the skyrocketing prices of crypto currencies including SOL, a crypto wallet is one of...

Malware Detection: Protecting Against Ever-Evolving Threats

Supercharging Your Enterprise Malware Detection Organizational users rely on multiple tools and products to improve their productivity and collaboration. These enterprise tools allow companies to share a large number of files such as PDFs, documents, spreadsheets, and...

How to Stop Phishing Attacks: Techniques, Tips & Tricks

Every IT admin has asked themselves, “How can I stop phishing attacks?” Phishing is unfortunately one of the most common, effective, and damaging attacks hackers use to break into bank accounts, steal data, steal money and overall - scam your company. Phishing attacks...