Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage costs of $20 billion. While there is no ransomware that specifically...
Cyren Security Blog
The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.
Featured Post
Latest Posts
Blocking Outbound Spam with Cyren’s Email Security Engine
Customer loss, as well as operational cost overruns, brand and reputational damage through blacklists, and even potential lawsuits are a few of the possible consequences service providers face as a result of spam coming from inside their network. Since the problem...
Inbound Anti-Spam Solution: Catch Outbreaks with Cyren
The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors. Proven across multiple scores of deployments that happen across the globe, Cyren’s Email Security...
Office 365 Antivirus Solution: Catch and Contain Evasive Malware with Cyren Inbox Security
Malware threats are known to continually grow in both their volume and complexity. Email-borne malware, especially that sent via Office 365, remains a large threat. The social engineering tactics convince recipients to open and unknowingly execute harmful attachments....
The Cost of NOT Getting Phished
by Max Avory Phishing campaigns continue to become more targeted and sophisticated, evading email gateways and Microsoft 365 Defender, and forcing businesses to increasingly rely on employees to spot suspicious messages. The statistics of potential data breaches are...
Anti-Phishing Software Solutions: What Are They?
We live in a fully digital world, where daily communication and business correspondence is done over email. While a multitude of benefits has come from this dependence on digital communication like increased productivity and efficiency, one threat persists, and it’s...
What is the Difference Between Vishing & Phishing Attacks?
Phishing attacks are an extremely common way hackers can gain access to your businesses’ sensitive or confidential information. In fact, 74% of organizations in the United States experienced a successful phishing attack. Additionally, millions of harmful site warnings...
Email Warning Banners
by Mike Fleck Many companies use email warning banners to alert their employees to potential phishing threats. However, the banners are often based on simplistic, generic rules and users quickly learn to ignore them. Here are two examples I noticed today:[External...
Trick or Treat: Ransomware or The Story Without a Happy Ending
by Ira Chernous This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story almost never has a happy ending. What is Ransomware? Ransomware is a type of malicious software that...
13 Types of Social Engineering Attacks
What Are Social Engineering Attacks? Social engineering attacks are the manipulation of individuals to the point where they give out confidential information. The type of information these attackers may seek varies, but when individuals or employees are targeted, they...