Search
Close this search box.

Blog

Spear Phishing, Whaling, and Delayed Detonation, Oh My!

Companies worldwide are up against sophisticated email attacks like Business Email Compromises (BEC). These attacks are also known as spear phishing, impersonation, and whaling, with the goal of convincing an end-user to release money or provide account information. Related: Microsoft 365 Is Wildly Successful and Profoundly Vulnerable – Here’s Why

Read More >

How Machine Learning Is Building a Better Spam Trap

Bad actors are constantly raising the ante on email scams. According to Microsoft, “phishers have been quietly retaliating, evolving their techniques to try and evade protections. In 2019, we saw phishing attacks reach new levels of creativity and sophistication.” To keep pace with these evasive attacks, threat protection software has

Read More >

You Should Enlist Your Employees in Threat Detection

Your employees’ instincts are incredibly valuable and can help you crowdsource threats. With Cyren Inbox Security, they’re one click away from flagging an email as suspicious, and telling Cyren to search for lookalike emails in the system. How IDRs leverage user data Though it’s often positioned as the “last line

Read More >