Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

Phishing through the prism of graphic design

by

Security Research & Analysis

What do bright and catchy presentations, laconic documents, and perfect CVs have in common? 

Anatomy of an Attack:  Password-Protected Files Attached to Emails

by

Microsoft 365 is pervasive and profoundly vulnerable. 

Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once

by

Security Research & Analysis

On Thursday, November 26, at 09:51 UTC, an immense phishing campaign started targeting more... 

Phishing hosted on high Alexa domains: another dangerous trick in Web

by

How much do you trust such services as Google, Windows, Dropbox? And what about the open access libraries? One more important question is...

Security Awareness Training Won’t Give CISOs or Employees Peace of Mind

by

Phishing Security Practices

I attended a virtual roundtable discussion with CISOs this week.  The session opened with a somber question:  what keeps you up at night?

Email spoofing BEC attack targeting numerous employees at once

by

Security Research & Analysis

Spear-phishing spoofed attacks have been and remain one of the most substantial cyber threats that organizations face nowadays.