Search
Close this search box.

Blog

A Dridex Phishing Campaign

The “Purchase” themed email is a commonly used subject in phishing campaigns. Threat actors can easily scrape the internet, in other words, specific data is very easily gathered and copied from the web. This makes company emails a very easy target, as they are available in their websites, especially the

Read More >

Office 365 Phishing Email Campaign Hides Excel Template in HTML

  Phishing remains one of the most popular types of corporate attacks in terms of its prevalence, and therefore it is not surprising that attackers are coming up with increasingly sophisticated methods to obtain the victim’s personal data. Signs of an Office 365 Phishing Attack  A Warning from Microsoft: The

Read More >

Loose SPF, DKIM, DMARC, and ARC Settings Sabotage Security

It’s safe to say that all of our Cyren Inbox Security customers use the native Office 365 security capabilities of Exchange Online Protection and Advanced Threat Protection (now collectively called Microsoft Defender for Office 365). If you follow this blog, you can’t help but notice that CIS and our incident

Read More >

Phishing through the prism of graphic design

A little design in the phishing world What do bright and catchy presentations, laconic documents, and perfect CVs have in common? Everyone can easily create it by using online graphic design platforms without wasting time. Almost everyone already knows about such services and have used at least one time before.

Read More >

Anatomy of a Malware Attack: Emails with Password-Protected Files

Almost 94% of all malware attacks are delivered via email. These attacks may include ransomware, adware, spyware, and more. Lately we have observed a growing trend of distributing malware through password-protected email attachments. Let’s look at an example of what this kind of malware attack looks like so that you

Read More >