With cyber-attacks continuing to be one of the greatest threats faced online, there is an increased discussion surrounding cybersecurity and privacy protection....
Cyren Security Blog Categories
Trick or Treat: Ransomware or The Story Without a Happy Ending
by Ira Chernous This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story...
11 Types of Social Engineering Attacks
What is social engineering? Social engineering attacks are the manipulation of individuals to the point that they give up confidential information. The type of...
Phishing Targets Phantom Wallet
The Solana Phantom Wallet by Kervin Alintanahin Phantom is a browser based crypto wallet where you can store, send, receive, stake and exchange tokens in the Solana...
JavaScript Obfuscation in Phishing Sites
by Dor Nabet We’ve all experienced the typical phishing site where the attacker asks that you enter your credentials while the sketchy Microsoft logo on top of the page...
Phishing by the Numbers – Oct 2021
The Industry Edition This blog is part of our monthly blog series analyzing incident response data from Cyren threat researchers and Cyren security clouds including...
LinkedIn Phish Kit
Scam Warning by Kervin Alintanahin Back in January, LinkedIn posted a warning about connection requests from individuals impersonating employees of a legitimate...
Discord Attack Targets NFT Projects
by Kervin Alintanahin Multiple Targets Discord Administrators/Moderators and NFT project members were targeted today in a well-planned social engineering attack....
Love Shopping Online?
by Ksenia Belianskaya The Covid-19 pandemic not only killed millions of people, but it also drastically changed the retail landscape. In fact, you could say that it...