Office 365 Advanced Threat Protection (also known as ATP and Defender) can provide your organization with advanced security features - keeping you protected from cybersecurity threats. With today's cybersecurity landscape, where new...
Cyren Security Blog
The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.
Featured Post
Latest Posts
Analyzing behavior to protect against BEC attacks
Understanding “normal” behaviors in email exchanges are key to combating advanced phishing and BEC attacks by John Stevenson Detecting Business Email Compromise (BEC) In the final part of our series of blogs on Business Email Compromise (BEC), it’s time to look at how...
Using NLP techniques to protect against BEC attacks
How Natural Language Programming help combat phishing and BEC attacks by John Stevenson Business Email Compromise (BEC) Business Email Compromise (BEC) covers a range of email attacks that typically share a common core attribute. There is no obvious executable...
Phishing with QR codes
Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the...
Abusing Remote Administration Tools
The bad, worse and the horrible by Gunnar Guðmundsson and Axel Marinho Guðmundsson Introduction In this article, we look at a malware payload from an exploited Microsoft Word document. With a little Python scripting and deciphering we research a single sample and...
Analyzing message metadata to protect against BEC attacks
Can analyzing message metadata help to protect organizations from becoming the victim of a successful BEC attack? Business Email Compromise (BEC) is an umbrella term spanning many forms of social engineering email attacks that typically share the common characteristic...
Using AI to protect against BEC attacks
With no payload to detect, how best can organizations protect themselves from Business Email Compromise and other social engineering attacks? by John Stevenson Sometimes the simplest frauds are the most successful. Some years ago, local authorities in the UK were...
What is Microsoft Office 365 Advanced Threat Protection?
Office 365 Advanced Threat Protection (also known as ATP and Defender) can provide your organization with advanced security features - keeping you protected from cybersecurity threats. With today's cybersecurity landscape, where new threats appear daily, if not...
The Hidden Costs of Phishing & BEC
By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO director at Fluid Networks to discuss how they dramatically reduced the time their security analysts spent managing the problem of phishing, BEC, and user education. Here were some of the...
3 Ways to Optimize Your Security Awareness Training Program
By Mike Fleck Despite investments of time and money in secure email gateways, phishing threats continue to be delivered to the user's inbox. To close this gap in automated detection, many organizations roll out user security awareness programs to train their employees...