Mysterious Transformation from Scammer to Executive Manager Trust but verify - how often have you heard this saying? Most likely a lot, it’s so easy for users to forget...
Cyren Security Blog Categories
Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once
Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once In the final days of November, Cyren Inbox Security detected a massive...
Email spoofing BEC attack targeting numerous employees at once
Spear-phishing spoofed attacks have been and remain one of the most substantial cyber threats that organizations face nowadays. And once we talk about spear-phishing,...
Microsoft reports a “leap in attack sophistication”
Last month Microsoft released a sobering Digital Defense Report. From their perch powering 600,000 enterprises’ cloud inboxes (in the United States alone), they report:...
Anatomy of a Phishing Attack: Stolen Microsoft 365 Credentials
Phishing attacks designed to steal Microsoft 365 credentials are launched every day and growing more sophisticated. We recently detected a massive attack that hid a...