Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

Phishing campaign masquerading Excel template in the html attachment

by

Security Research & Analysis

Phishing remains one of the most popular types of corporate attacks in terms of its prevalence, and therefore it is not surprising that attackers are coming up with increasingly sophisticated methods to obtain the victim's personal data.

Loose SPF, DKIM, DMARC, and ARC Settings Sabotage Security

by

Security Research & Analysis

It’s safe to say that all of our Cyren Inbox Security customers use the native Office 365 security capabilities of Exchange Online Protection and Advanced Threat Protection (now collectively called Microsoft Defender for Office 365).

“Are you satisfied?” Cyren sees increasing use of forms in account takeover attacks

by

Security Research & Analysis

Every internet user participates in surveys every day: “Do you like our service?” “Are you satisfied with the order?” “Please, fill the form below to make us better for you!”

Phishing through the prism of graphic design

by

Security Research & Analysis

What do bright and catchy presentations, laconic documents, and perfect CVs have in common? 

Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once

by

Security Research & Analysis

On Thursday, November 26, at 09:51 UTC, an immense phishing campaign started targeting more... 

Email spoofing BEC attack targeting numerous employees at once

by

Security Research & Analysis

Spear-phishing spoofed attacks have been and remain one of the most substantial cyber threats that organizations face nowadays.