by Maharlito Aquino Key Points: Smishing is causing millions of dollars in losses. Robokiller insights show that consumers have received over 12 billion in robotexts....
Cyren Security Blog Categories
Office 365 Phishing, BEC, & Ransomware Survey Highlights
by Max Avory Reading a complete report is not for everyone. If that includes you, here are the key takeaways from the 2022 Osterman report on Phishing, BEC, and...
IRS Scams 2022
By Dexter See To, Joy Celine Faltado, & Mike Fleck Tax scams are so prevalent that the United States Internal Revenue Service has published a very long FAQ page to...
Cybercriminals Unleash Ukrainian Crypto Scams
Over 100K daily fake donation emails uncovered by the Cyren research team By Magni Reynir Sigurðsson Cybercriminals know which techniques increase their chances of...
Please Approve This Account Takeover
By Dexter See To The pandemic has changed the way we live, the way we work. The world is becoming increasingly digitized as more employees embrace a remote work model....
Crypter Malware: A Deep Dive Into NSIS-Based Crypters
By Floser Bacurio Jr We have been observing that malware is being distributed via NSIS-based crypter. Malware such as FormBook, AgentTesla, GULoader, just to name a...
Glossary of Cyber Security Terms and Terminologies
With cyber-attacks continuing to be one of the greatest threats faced online, there is an increased discussion surrounding cybersecurity and privacy protection....
Trick or Treat: Ransomware or The Story Without a Happy Ending
by Ira Chernous This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story...
13 Types of Social Engineering Attacks
What Are Social Engineering Attacks? Social engineering attacks are the manipulation of individuals to the point where they give out confidential information. The type...