Category: Blog

JavaScript Obfuscation in Phishing Sites

We’ve all experienced the typical phishing site where the attacker asks that you enter your credentials while the sketchy Microsoft logo on top of the page makes you feel comfortable doing so. Those phishing sites used to be easy to recognize: the simple behind-the-scenes code would reveal the site’s identity,

Human & Machine : Cyren Inbox Security and KnowBe4

Cyren has integrated our anti-phishing solution, Cyren Inbox Security, with KnowBe4’s security awareness training platform. This idea began with a very basic customer feature request but has evolved into a new paradigm for defending enterprises against phishing and BEC. Here is a quick rundown of how harmonizing user education, advanced

Malware Detection: Protecting Against Ever-Evolving Threats

Supercharging Your Enterprise Malware Detection Organizational users rely on multiple tools and products to improve their productivity and collaboration. These enterprise tools allow companies to share a large number of files such as PDFs, documents, spreadsheets, and more. This allows for easy collaboration and communication between employees. Increased reliance on

How to Stop & Prevent Phishing Attacks: Tips & Tricks

Every IT admin has asked themselves, “How can I stop phishing attacks?” Phishing is unfortunately one of the most common, effective, and damaging attacks hackers can use to break into bank accounts, steal data, take money and overall – scam your company. Phishing attacks have always been on the rise,

Phishing by the Numbers – Oct 2021

The Industry Edition  This blog is part of our monthly blog series analyzing incident response data from Cyren threat researchers and Cyren security clouds including Cyren Inbox Security. This month, the research team analyzed the data by industry to confirm our suspicion that certain types of companies are targeted more

LinkedIn Phish Kit

Scam Warning   Back in January, LinkedIn posted a warning about connection requests from individuals impersonating employees of a legitimate organization. These requests come from newly created accounts. If someone accepts the request, the attackers will have more access to the victim’s data. With this information, they can create specific

Discord Attack Targets NFT Projects

Multiple Targets  Discord Administrators/Moderators and NFT project members were targeted today in a well-planned social engineering attack. Attackers managed to take over sessions of some privileged Discord accounts and used them to send messages to servers/users in Discord. Since the messages and announcement came from moderators’ accounts, it is likely

Love Shopping Online?

The Covid-19 pandemic not only killed millions of people, but it also drastically changed the retail landscape. In fact, you could say that it killed the retail industry. However, this fact was not a disadvantage for phishers; loads of shops started functioning online, leaving a great opportunity for the bad

Formbook Adds RTF Exploit to Its Delivery Methods

Formbook, a well-known family of malware that steals information by grabbing user input from forms, has been seen over the past months for actively repackaging itself to gain more ground in the threat landscape. This time we have seen a well-known RTF exploit, CVE-2017-11882, being used by threat actors to

Spear Phishing Examples: What It Is & How to Avoid Attacks

What is Spear Phishing? Spear phishing is a highly targeted phishing attack, which is focused on a specific person or group of people. In these cases, a perpetrator, who is typically disguised as a trusted individual, deceives a target into clicking a spoofed link in an email, direct message, or