Cyren Security Blog

How Phishers Abuse Hypertext Transfer Protocol Secure (HTTPS) Protocol

von

Security Research & Analysis

What is the first thing that comes to mind when we see sites using HTTPS protocol? Subconsciously we tend to trust these sites presuming that all that we see and/or enter there is checked, secured, and verified.

Phishing on Adobe Spark

von

Security Research & Analysis

Threat actors are always on the lookout for inconspicuous ways to execute malicious attacks. One such tactic that has become common is the use of legitimate services as part of phishing campaigns.

Ransomware Attacks Are Here to Stay

von

Ransomware

Following the highly publicized (and successful) $4M+ ransom of Colonial Pipeline, attacks like these will only get more popular.

SolarMarker Backdoor Pretends to be Legit PDFescape Installer

von

The modified installer of legit "PDFescape Desktop Installer" app looks like this:

Dissecting a UnionBank Phishing Campaign

von

We have been seeing email notifications about login attempts to UnionBank online accounts, prompting users to reset their password if they found the login attempts were suspicious.

Fake DocuSign Download Page Leads to Hentai Onichan Ransomware

von

Security Research & Analysis

We recently received samples that we suspected were “phishy” in nature, but after analyzing the email attachment a severe threat was exposed.