Blog

Insights on Data Security & Threat Intelligence

Phishing by the numbers – July 2021

The Cyren Incident and Response research team continuously collects phishing data and identifies the most effective phishing attacks using Cyren Inbox Security (CIS), the company’s flagship Inbox Detection and Response* solution. CIS directly connects to Office 365, continuously detecting and automatically capturing phishing attacks that evade secure email gateways and

Read More >

Safe Links in Office 365

According to Microsoft, Safe Links is a feature of Microsoft 365 Defender (f.k.a. Advanced Threat Protection, Microsoft Defender for Office 365) that helps protect from users clicking on malicious URLs in emails. This feature provides URL scanning as well as rewriting of inbound emails within the mail flow, and time-of-click

Read More >

Call Me An Impostor

Mysterious Transformation from Scammer to Executive Manager Trust but verify – how often have you heard this saying? Most likely a lot, it’s so easy for users to forget this important instruction when our email inboxes are busier than ever. As the number of sent and received emails has increased

Read More >

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) – also known as email account compromise (EAC) – is a type of phishing or social engineering attack intended to scam organizations out of money through the impersonation of executives.  Business Email Compromise Scams (BEC) Techniques How does BEC work? The most effective BEC campaigns begin

Read More >

2021 Phishing & BEC Attacks

I’ve been very busy this summer, which is why I’m just now reading the 2021 Verizon Data Breach Investigations Report. Here are a few takeaways from the section about the “Social Engineering” attack pattern (read: phishing). “Phishing is responsible for the vast majority of breaches in this pattern, with cloud-based

Read More >

Adobe Cloud Services Phishing: Adobe Spark Scams & More

Threat actors are always on the lookout for inconspicuous ways to execute malicious attacks. One such tactic that has become common is the use of legitimate services as part of phishing campaigns. Since April this year, researchers at Cyren have seen a rise in phishing URLs linked from spark.adobe.com pages.

Read More >