How Natural Language Programming help combat phishing and BEC attacks by John Stevenson Business Email Compromise (BEC) Business Email Compromise (BEC) covers a range...
Cyren Security Blog Categories
Phishing with QR codes
Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known...
How the War in Ukraine Has Influenced the Scammers’ Underground
by Ira Chernous For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start...
What is a Zero-Day Phishing Attack? Identifying Vulnerabilities & More
"Zero-day" is a term that broadly describes a series of recently discovered cybersecurity vulnerabilities hackers utilize to attack systems. This term, "zero-day",...
What is Smishing? Prevention, Examples & More
by Maharlito Aquino Key Points: Smishing is causing millions of dollars in losses. Robokiller insights show that consumers have received over 12 billion in robotexts....
Office 365 Phishing, BEC, & Ransomware Survey Highlights
by Max Avory Reading a complete report is not for everyone. If that includes you, here are the key takeaways from the 2022 Osterman report on Phishing, BEC, and...
IRS Scams 2022
By Dexter See To, Joy Celine Faltado, & Mike Fleck Tax scams are so prevalent that the United States Internal Revenue Service has published a very long FAQ page to...
Please Approve This Account Takeover
By Dexter See To The pandemic has changed the way we live, the way we work. The world is becoming increasingly digitized as more employees embrace a remote work model....
Inbound Anti-Spam Solution: Catch Outbreaks with Cyren
The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors....