Blog

Insights on Data Security & Threat Intelligence

Anti-Phishing Software Solutions: What Are They?

We live in a fully digital world, where daily communication and business correspondence is done over email. While a multitude of benefits has come from this dependence on digital communication like increased productivity and efficiency, one threat persists, and it’s phishing attacks.  Phishing cybercrimes have grown exponentially over the past

Read More >

What is the Difference Between Vishing & Phishing Attacks?

Phishing attacks are an extremely common way hackers can gain access to your businesses’ sensitive or confidential information. In fact, 74% of organizations in the United States experienced a successful phishing attack. Additionally, millions of harmful site warnings are being reported every month and continue to grow as we adopt

Read More >

Email Warning Banners

by Mike Fleck Many companies use email warning banners to alert their employees to potential phishing threats. However, the banners are often based on simplistic, generic rules and users quickly learn to ignore them. Here are two examples I noticed today: If this message comes from an unexpected sender or

Read More >

13 Types of Social Engineering Attacks

What Are Social Engineering Attacks? Social engineering attacks are the manipulation of individuals to the point where they give out confidential information. The type of information these attackers may seek varies, but when individuals or employees are targeted, they are usually looking for passwords or banking information. They could also

Read More >

Phishing Targets Phantom Wallet

Phantom is a browser based crypto wallet where you can store, send, receive, stake and exchange tokens in the Solana blockchain. With the skyrocketing prices of crypto currencies including SOL, a crypto wallet is one of the things we can use in order to get into the crypto currency action.

Read More >

JavaScript Obfuscation in Phishing Sites

We’ve all experienced the typical phishing site where the attacker asks that you enter your credentials while the sketchy Microsoft logo on top of the page makes you feel comfortable doing so. Those phishing sites used to be easy to recognize: the simple behind-the-scenes code would reveal the site’s identity,

Read More >

Human & Machine : Cyren Inbox Security and KnowBe4

Cyren has integrated our anti-phishing solution, Cyren Inbox Security, with KnowBe4’s security awareness training platform. This idea began with a very basic customer feature request but has evolved into a new paradigm for defending enterprises against phishing and BEC. Here is a quick rundown of how harmonizing user education, advanced

Read More >

Malware Detection: Protecting Against Ever-Evolving Threats

Supercharging Your Enterprise Malware Detection Organizational users rely on multiple tools and products to improve their productivity and collaboration. These enterprise tools allow companies to share a large number of files such as PDFs, documents, spreadsheets, and more. This allows for easy collaboration and communication between employees. Increased reliance on

Read More >