By Mike Fleck Despite investments of time and money in secure email gateways, phishing threats continue to be delivered to the user's inbox. To close this gap in automated detection, many organizations roll out user security awareness...
Cyren Security Blog
The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.
Featured Post
Latest Posts
Office 365 Phishing, BEC, & Ransomware Survey Highlights
by Max Avory Reading a complete report is not for everyone. If that includes you, here are the key takeaways from the 2022 Osterman report on Phishing, BEC, and Ransomware Threats for Microsoft 365 Customers. “Less than half the organizations ranked their currently...
IRS Scams 2022
By Dexter See To, Joy Celine Faltado, & Mike Fleck Tax scams are so prevalent that the United States Internal Revenue Service has published a very long FAQ page to warn people of the risks. As we approach the peak of the income tax season in the United States, we...
Cybercriminals Unleash Ukrainian Crypto Scams
Over 100K daily fake donation emails uncovered by the Cyren research team By Magni Reynir Sigurðsson Cybercriminals know which techniques increase their chances of successfully scamming unsuspecting victims, shamelessly exploiting any event regardless of human...
Please Approve This Account Takeover
By Dexter See To The pandemic has changed the way we live, the way we work. The world is becoming increasingly digitized as more employees embrace a remote work model. Along with these changes, phishing attacks are growing by the minute and businesses, big and small,...
Crypter Malware: A Deep Dive Into NSIS-Based Crypters
By Floser Bacurio Jr We have been observing that malware is being distributed via NSIS-based crypter. Malware such as FormBook, AgentTesla, GULoader, just to name a few, have been using NSIS as their loader. We have seen several ways of obfuscation implemented with...
Glossary of Cyber Security Terms and Terminologies
With cyber-attacks continuing to be one of the greatest threats faced online, there is an increased discussion surrounding cybersecurity and privacy protection. Companies spanning industries are increasingly concerned about protecting sensitive information and data...
19 Best Practices for Securing Microsoft Office 365
Microsoft Office 365 is a massive platform that many businesses use. It is considered the world's most popular office suite of productivity tools. Unfortunately, this means it is a hugely popular target for cyber-attackers as well. Microsoft Office 365 has a variety...
What is Spyware?
Spyware is a type of malicious software that enters your computer or mobile device without consent in order to gain access to your personal information and data and relays it to a third party. Considered a type of malware, spyware spies on the computer user, capturing...
Cyren’s Email Security Engine for IP Reputation
The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions. Messaging security vendors can achieve...