Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

Loose SPF, DKIM, DMARC, and ARC Settings Sabotage Security

by

Security Research & Analysis

It’s safe to say that all of our Cyren Inbox Security customers use the native Office 365 security capabilities of Exchange Online Protection and Advanced Threat Protection (now collectively called Microsoft Defender for Office 365).

“Are you satisfied?” Cyren sees increasing use of forms in account takeover attacks

by

Security Research & Analysis

Every internet user participates in surveys every day: “Do you like our service?” “Are you satisfied with the order?” “Please, fill the form below to make us better for you!”

Short-lived Attacks with Excel4 Macro (XLM) Malware

by

Over the past 30 days, we have seen a surge of Excel4 Macro (XLM) malware in our feeds, and on the 25th of January, there were quite a few detections from XF/Kryptik.B.gen!Camelot.

Phishing through the prism of graphic design

by

Security Research & Analysis

What do bright and catchy presentations, laconic documents, and perfect CVs have in common? 

Anatomy of an Attack:  Password-Protected Files Attached to Emails

by

Microsoft 365 is pervasive and profoundly vulnerable. 

Anatomy of an Attack: Evasive Zoom phishing campaign using multiple phishing techniques at once

by

Security Research & Analysis

On Thursday, November 26, at 09:51 UTC, an immense phishing campaign started targeting more...