Search
Close this search box.

Category: Blog

The Cost of NOT Getting Phished

Phishing campaigns continue to become more targeted and sophisticated, evading email gateways and Microsoft 365 Defender, and forcing businesses to increasingly rely on employees to spot suspicious messages. The statistics of potential data breaches are alarming – with some estimating that cybercrime costs will grow 15 percent per year in

Anti-Phishing Software Solutions: What Are They?

We live in a fully digital world, where daily communication and business correspondence is done over email. While a multitude of benefits has come from this dependence on digital communication like increased productivity and efficiency, one threat persists, and it’s phishing attacks.  Phishing cybercrimes have grown exponentially over the past

What is the Difference Between Vishing & Phishing Attacks?

Phishing attacks are an extremely common way hackers can gain access to your businesses’ sensitive or confidential information. In fact, 74% of organizations in the United States experienced a successful phishing attack. Additionally, millions of harmful site warnings are being reported every month and continue to grow as we adopt

Email Warning Banners

by Mike Fleck Many companies use email warning banners to alert their employees to potential phishing threats. However, the banners are often based on simplistic, generic rules and users quickly learn to ignore them. Here are two examples I noticed today: If this message comes from an unexpected sender or

Trick or Treat: Ransomware or The Story Without a Happy Ending

This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story almost never has a happy ending. What is Ransomware?  Ransomware is a type of malicious software that uses encryption to hold a

13 Types of Social Engineering Attacks

What Are Social Engineering Attacks? Social engineering attacks are the manipulation of individuals to the point where they give out confidential information. The type of information these attackers may seek varies, but when individuals or employees are targeted, they are usually looking for passwords or banking information. They could also

Phishing Targets Phantom Wallet

Phantom is a browser based crypto wallet where you can store, send, receive, stake and exchange tokens in the Solana blockchain. With the skyrocketing prices of crypto currencies including SOL, a crypto wallet is one of the things we can use in order to get into the crypto currency action.

JavaScript Obfuscation in Phishing Sites

We’ve all experienced the typical phishing site where the attacker asks that you enter your credentials while the sketchy Microsoft logo on top of the page makes you feel comfortable doing so. Those phishing sites used to be easy to recognize: the simple behind-the-scenes code would reveal the site’s identity,

Human & Machine : Cyren Inbox Security and KnowBe4

Cyren has integrated our anti-phishing solution, Cyren Inbox Security, with KnowBe4’s security awareness training platform. This idea began with a very basic customer feature request but has evolved into a new paradigm for defending enterprises against phishing and BEC. Here is a quick rundown of how harmonizing user education, advanced

Malware Detection: Protecting Against Ever-Evolving Threats

Supercharging Your Enterprise Malware Detection Organizational users rely on multiple tools and products to improve their productivity and collaboration. These enterprise tools allow companies to share a large number of files such as PDFs, documents, spreadsheets, and more. This allows for easy collaboration and communication between employees. Increased reliance on