Category: Blog

Blocking Outbound Spam with Cyren’s Email Security Engine

Customer loss, as well as operational cost overruns, brand and reputational damage through blacklists, and even potential lawsuits are a few of the possible consequences service providers face as a result of spam coming from inside their network. Since the problem differs from inbound spam, dealing with outbound spam effectively

Inbound Anti-Spam Solution: Catch Outbreaks with Cyren

The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors. Proven across multiple scores of deployments that happen across the globe, Cyren’s Email Security Engine for Inbound Anti-Spam delivers industry-leading detection performance to Microsoft Office 365 users,

Office 365 Antivirus Solution: Catch and Contain Evasive Malware with Cyren Inbox Security

Malware threats are known to continually grow in both their volume and complexity. Email-borne malware, especially that sent via Office 365, remains a large threat. The social engineering tactics convince recipients to open and unknowingly execute harmful attachments. Cyren Inbox Securityprovides enterprises the ultimate threat defense capability combined with risk-based

The Cost of NOT Getting Phished

Phishing campaigns continue to become more targeted and sophisticated, evading email gateways and Microsoft 365 Defender, and forcing businesses to increasingly rely on employees to spot suspicious messages. The statistics of potential data breaches are alarming – with some estimating that cybercrime costs will grow 15 percent per year in

Anti-Phishing Software Solutions: What Are They?

We live in a fully digital world, where daily communication and business correspondence is done over email. While a multitude of benefits has come from this dependence on digital communication like increased productivity and efficiency, one threat persists, and it’s phishing attacks.  Phishing cybercrimes have grown exponentially over the past

What is the Difference Between Vishing & Phishing Attacks?

Phishing attacks are an extremely common way hackers can gain access to your businesses’ sensitive or confidential information. In fact, 74% of organizations in the United States experienced a successful phishing attack. Additionally, millions of harmful site warnings are being reported every month and continue to grow as we adopt

Email Warning Banners

by Mike Fleck Many companies use email warning banners to alert their employees to potential phishing threats. However, the banners are often based on simplistic, generic rules and users quickly learn to ignore them. Here are two examples I noticed today: If this message comes from an unexpected sender or

Trick or Treat: Ransomware or The Story Without a Happy Ending

This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story almost never has a happy ending. What is Ransomware?  Ransomware is a type of malicious software that uses encryption to hold a

13 Types of Social Engineering Attacks

What Are Social Engineering Attacks? Social engineering attacks are the manipulation of individuals to the point where they give out confidential information. The type of information these attackers may seek varies, but when individuals or employees are targeted, they are usually looking for passwords or banking information. They could also

Phishing Targets Phantom Wallet

Phantom is a browser based crypto wallet where you can store, send, receive, stake and exchange tokens in the Solana blockchain. With the skyrocketing prices of crypto currencies including SOL, a crypto wallet is one of the things we can use in order to get into the crypto currency action.