Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

A Dridex Phishing Campaign

by

The “Purchase” themed email is a commonly used subject in phishing campaigns. Threat actors can easily scrape the internet, in other words, specific data is very easily gathered and copied from the web.

Phishing campaign masquerading Excel template in the html attachment

by

Security Research & Analysis

Phishing remains one of the most popular types of corporate attacks in terms of its prevalence, and therefore it is not surprising that attackers are coming up with increasingly sophisticated methods to obtain the victim's personal data.

Loose SPF, DKIM, DMARC, and ARC Settings Sabotage Security

by

Security Research & Analysis

It’s safe to say that all of our Cyren Inbox Security customers use the native Office 365 security capabilities of Exchange Online Protection and Advanced Threat Protection (now collectively called Microsoft Defender for Office 365).

“Are you satisfied?” Cyren sees increasing use of forms in account takeover attacks

by

Security Research & Analysis

Every internet user participates in surveys every day: “Do you like our service?” “Are you satisfied with the order?” “Please, fill the form below to make us better for you!”

Short-lived Attacks with Excel4 Macro (XLM) Malware

by

Over the past 30 days, we have seen a surge of Excel4 Macro (XLM) malware in our feeds, and on the 25th of January, there were quite a few detections from XF/Kryptik.B.gen!Camelot.

Phishing through the prism of graphic design

by

Security Research & Analysis

What do bright and catchy presentations, laconic documents, and perfect CVs have in common?