For more than a year, many employees have been working remotely and may never return to the companies' offices. This trend brings a lot of challenges for IT Security. Although infrastructure and devices are under control of the IT teams, working remotely has...
Cyren Security Blog
Featured Post
Latest Posts
Square Enix Phishing Campaign
From July 20 until August 16, 2021, Cyren observed a significant increase in the number of Square Enix phishing URLs. The campaign coincided with 14 days of free play announced by Square Enix on July 12, 2021. During this period, we detected a total of 47,076 URLs for...
New detection category for eXpurgate customers
For more than a year, many employees have been working remotely and may never return to the companies' offices. This trend brings a lot of challenges for IT Security. Although infrastructure and devices are under control of the IT teams, working remotely has...
Phishing by the numbers – July 2021
The Cyren Incident and Response research team continuously collects phishing data and identifies the most effective phishing attacks using Cyren Inbox Security (CIS), the company’s flagship Inbox Detection and Response* solution. CIS directly connects to Office 365,...
Safe Links in Office 365
Safe Links is a feature of Microsoft Defender for Office 365 (formerly known as Advanced Threat Protection) that helps protect from users clicking on malicious URLs. Proofpoint calls their version, URL Defense. Mimecast calls theirs, URL Protect. All these feature...
Alert: Fraudsters Stealing Bank Account Details via Fake Facebook Pages
I recently received an SMS notification from my bank about possible fraudulent activity on my credit card account. While waiting for an agent to take my call, I browsed through Facebook to look for their support page. Unfortunately, I found two pages that looked...
Call Me An Impostor
Mysterious Transformation from Scammer to Executive Manager Trust but verify - how often have you heard this saying? Most likely a lot, it’s so easy for users to forget this important instruction when our email inboxes are busier than ever. As the number of sent and...
What is Business Email Compromise (BEC)?
Business Email Compromise (BEC) - also known as email account compromise (EAC) - is a type of phishing attack intended to scam organizations out of money through the impersonation of executives. First, criminals will work to gain access to your corporate systems via a...
2021 Phishing & BEC Attacks
I’ve been very busy this summer, which is why I’m just now reading the 2021 Verizon Data Breach Investigations Report. Here are a few takeaways from the section about the “Social Engineering” attack pattern (read: phishing). “Phishing is responsible for the vast...
Axie Infinity Player Wallets Targeted by Poisoned Google Ads Content
The top NFT Ethereum-based game Axie infinity, is a Pokemon-like play-to-earn game that lets its users earn SLP (Smooth Love Potion). This potion can be traded as a crypto currency and has recently reached its all-time high value of $0.40+. Many people are trying to...