A little design in the phishing world What do bright and catchy presentations, laconic documents, and perfect CVs have in common? Everyone can easily create it by using...
Cyren Security Blog Categories
Anatomy of a Malware Attack: Emails with Password-Protected Files
Almost 94% of all malware attacks are delivered via email. These attacks may include ransomware, adware, spyware, and more. Lately we have observed a growing trend of...
Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once
Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once In the final days of November, Cyren Inbox Security detected a massive...
Phishing hosted on high Alexa domains: another dangerous trick in Web
Dark side of high Alexa domains How much do you trust such services as Google, Windows, Dropbox? And what about the open access libraries? One more important question...
Phishers abusing Google App Engine
Over the last few weeks Cyren has observed a massive spike in phishing sites hosted on the appspot.com domain that Google uses for its free Google App Engine. Taking...
Microsoft reports a “leap in attack sophistication”
Last month Microsoft released a sobering Digital Defense Report. From their perch powering 600,000 enterprises’ cloud inboxes (in the United States alone), they report:...
SendGrid & Mailchimp Phishing Attacks: How Scammers Leverage Email Delivery Services To Their Advantage
Lately, among the myriad phishing attacks we observe and detect via Cyren Inbox Security, attacks that are distributed via email delivery services (like SendGrid,...
Anatomy of a Phishing Attack: Stolen Microsoft 365 Credentials
Phishing attacks designed to steal Microsoft 365 credentials are launched every day and growing more sophisticated. We recently detected a massive attack that hid a...