by Ira Chernous This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story...
Cyren Security Blog Categories
Malware Detection: Protecting Against Ever-Evolving Threats
Supercharging Your Enterprise Malware Detection Organizational users rely on multiple tools and products to improve their productivity and collaboration. These...
LinkedIn Phish Kit
Scam Warning by Kervin Alintanahin Back in January, LinkedIn posted a warning about connection requests from individuals impersonating employees of a legitimate...
Formbook Adds RTF Exploit to Its Delivery Methods
by Maharlito Aquino Formbook, a well-known family of malware that steals information by grabbing user input from forms, has been seen over the past months for actively...
Phishing by the numbers – September 2021
This blog is part of our monthly blog series analyzing incident response data from Cyren threat researchers and Cyren security clouds including Cyren Inbox Security....
Phishing by the numbers – August 2021
This is a follow up to the July edition published last month. For this August edition of Phishing by the numbers, we’re presenting summary statistics along with a...
Phishing by the numbers – July 2021
The Cyren Incident and Response research team continuously collects phishing data and identifies the most effective phishing attacks using Cyren Inbox Security (CIS),...
Axie Infinity Player Wallets Targeted by Poisoned Google Ads Content
The top NFT Ethereum-based game Axie infinity, is a Pokemon-like play-to-earn game that lets its users earn SLP (Smooth Love Potion). This potion can be traded as a...
Adobe Cloud Services Phishing: Adobe Spark Scams & More
Threat actors are always on the lookout for inconspicuous ways to execute malicious attacks. One such tactic that has become common is the use of legitimate services as...