Category: Blog

Users’ Power Against Phishing Attacks

Does a perfect email security solution exist? The answer is right in front of you, but not in the way you think. Tell me who your user is, I will tell who you are  We all know users are considered the weakest link in any email security program. What if

Phishing by the numbers – August 2021

This is a follow up to the July edition published last month. For this August edition of Phishing by the numbers, we’re presenting summary statistics along with a deeper dive into a specific customer. Summary Statistics In August, Cyren detected nearly 24,000 confirmed email threats that evaded detection by the

Square Enix Phishing Campaign

From July 20 until August 16, 2021, Cyren observed a significant increase in the number of Square Enix phishing URLs. The campaign coincided with 14 days of free play announced by Square Enix on July 12, 2021. During this period, we detected a total of 47,076 URLs for an average

Phishing by the numbers – July 2021

The Cyren Incident and Response research team continuously collects phishing data and identifies the most effective phishing attacks using Cyren Inbox Security (CIS), the company’s flagship Inbox Detection and Response* solution. CIS directly connects to Office 365, continuously detecting and automatically capturing phishing attacks that evade secure email gateways and

Safe Links in Office 365

According to Microsoft, Safe Links is a feature of Microsoft 365 Defender (f.k.a. Advanced Threat Protection, Microsoft Defender for Office 365) that helps protect from users clicking on malicious URLs in emails. This feature provides URL scanning as well as rewriting of inbound emails within the mail flow, and time-of-click

Alert: Fraudsters Stealing Bank Account Details via Fake Facebook Pages

  I recently received an SMS notification from my bank about possible fraudulent activity on my credit card account. While waiting for an agent to take my call, I browsed through Facebook to look for their support page. Unfortunately, I found two pages that looked almost exactly alike. The difference

Call Me An Impostor

Mysterious Transformation from Scammer to Executive Manager Trust but verify – how often have you heard this saying? Most likely a lot, it’s so easy for users to forget this important instruction when our email inboxes are busier than ever. As the number of sent and received emails has increased

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) – also known as email account compromise (EAC) – is a type of phishing or social engineering attack intended to scam organizations out of money through the impersonation of executives.  Business Email Compromise Scams (BEC) Techniques How does BEC work? The most effective BEC campaigns begin

2021 Phishing & BEC Attacks

I’ve been very busy this summer, which is why I’m just now reading the 2021 Verizon Data Breach Investigations Report. Here are a few takeaways from the section about the “Social Engineering” attack pattern (read: phishing). “Phishing is responsible for the vast majority of breaches in this pattern, with cloud-based

Axie Infinity Player Wallets Targeted by Poisoned Google Ads Content

The top NFT Ethereum-based game Axie infinity, is a Pokemon-like play-to-earn game that lets its users earn SLP (Smooth Love Potion). This potion can be traded as a crypto currency and has recently reached its all-time high value of $0.40+. Many people are trying to get into this hot crypto