Category: Blog

LinkedIn Phish Kit

Scam Warning   Back in January, LinkedIn posted a warning about connection requests from individuals impersonating employees of a legitimate organization. These requests come from newly created accounts. If someone accepts the request, the attackers will have more access to the victim’s data. With this information, they can create specific

Discord Attack Targets NFT Projects

Multiple Targets  Discord Administrators/Moderators and NFT project members were targeted today in a well-planned social engineering attack. Attackers managed to take over sessions of some privileged Discord accounts and used them to send messages to servers/users in Discord. Since the messages and announcement came from moderators’ accounts, it is likely

Love Shopping Online?

The Covid-19 pandemic not only killed millions of people, but it also drastically changed the retail landscape. In fact, you could say that it killed the retail industry. However, this fact was not a disadvantage for phishers; loads of shops started functioning online, leaving a great opportunity for the bad

Formbook Adds RTF Exploit to Its Delivery Methods

Formbook, a well-known family of malware that steals information by grabbing user input from forms, has been seen over the past months for actively repackaging itself to gain more ground in the threat landscape. This time we have seen a well-known RTF exploit, CVE-2017-11882, being used by threat actors to

Spear Phishing Examples: What It Is & How to Avoid Attacks

What is Spear Phishing? Spear phishing is a highly targeted phishing attack, which is focused on a specific person or group of people. In these cases, a perpetrator, who is typically disguised as a trusted individual, deceives a target into clicking a spoofed link in an email, direct message, or

The Covid-19 Effect on well-known Brands scam

The global coronavirus pandemic has forced companies to reevaluate how digital channels can be used to support business continuity through the crisis and beyond. The crisis is fundamentally changing how and what consumers buy and accelerating immense structural changes in the retail business industry. With these changes, organizations have an

Phishing by the numbers – September 2021

This blog is part of our monthly blog series analyzing incident response data from Cyren threat researchers and Cyren security clouds including Cyren Inbox Security. October is Cybersecurity Awareness Month, and the theme for the week of October 11 is Phight the Phish. Below are some statistics about that “Phight”

Cyren Incident Response Service (CIRS) for Email Threat Protection

Email threats are always evolving. As email has become crucial to business communications, hackers have found new ways to use email in order to breach corporate security. From routine email threats such as viruses and spam to more advanced such as phishing, spear-phishing, and wire transfer phishing, organizations need to take email

The Anatomy of a Phishing Email Attack

  Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, 75% of organizations around the world experienced some kind of phishing attack in 2020. But, what is phishing? A phishing attack includes sending fraudulent emails which appear to be coming

Phishing Attack Prevention: How to Avoid Phishing Attacks with Cyren Threat InDepth

What is Phishing Attack Prevention? Phishing attack prevention refers to companies taking security measures in order to prevent phishing attacks on their employees. The measures taken to improve phishing protection can help you avoid detrimental impacts on your business. This makes phishing attack prevention more important than ever. With more