From Side Project to Strategic Acquisition: Cyvore Acquires Scan My SMS

In cybersecurity, some of the most impactful innovations begin as side projects. Scan My SMS, the viral tool that helped thousands of users instantly detect phishing, has officially joined Cyvore. What started as a small initiative by two Israeli security researchers is now part of Cyvore’s broader mission to secure every conversation in the modern […]
Phishing in Israel: The digital threat targeting citizens post-war – opinion

Phishing in Israel: The Silent War After the War Even as missiles stop falling, a different kind of attack continues – silent, sophisticated, and aimed directly at our digital lives.In a new op-ed for The Jerusalem Post, Cyvore CEO Ori Segal warns that cyber warfare and phishing have become the next front of national security, […]
Deepfake Attacks Surge: Why Workspace Security Can’t Wait

Introduction This week, new industry data confirms what security teams have feared: deepfake-enabled fraud is accelerating, and many organizations remain underprepared. According to the latest AI Deepfake Threat Report, 85% of mid-to-large organizations experienced at least one deepfake incident in the past year, and over half suffered financial losses averaging $280,000+. IT Pro+1 For CISOs […]
Optimism in action: Israeli tech executives reflect on a challenging year

Despite geopolitical tensions and economic uncertainty, Israel’s tech leaders share insights, resilience and a forward-looking vision for the future “Over the past year, phishing and fraud attacks have surged dramatically, increasingly delivered through video calls, phone conversations and instant messages,” explains Cyvore Security CEO Ori Segal. “Cybercriminals now exploit deepfake technology to convincingly mimic voices […]
The Rise of Workspace Threats: Why CISOs Should Care

1. The Evolution from Email to Multi-Channel Attack Surfaces Where once email alone was the focus, threat actors now operate across Zoom, Microsoft Teams, Slack, WhatsApp, CRMs – anywhere communication happens. In its launch announcement, Cyvore describes this shift as attackers “moving with” users into hybrid, live collaboration environments. These platforms are increasingly the locus […]
Cyvore Wins 3rd Place at Tech1: A New Signal in Cyber Defense

We’re proud to announce that Cyvore has claimed 3rd place in the 2025 Tech1 Competition, securing a spot on the podium among Israel’s most promising tech ventures. Held in Eilat, Tech1 brings together the top early-stage startups redefining the future across sectors like AI, cybersecurity, and digital infrastructure. For us, this recognition is a strong signal […]
Cyvore Named Finalist in Tech1 Podium Competition

Cyvore has been selected as a finalist in the 2025 Tech1 Podium Competition, joining a shortlist of startups leading the next wave of innovation in Israel. Held May 18-20 in Eilat, Tech1 highlights bold technologies with global impact. Cyvore will present how our platform protects digital communication spaces- where deepfake impersonations, phishing, and real-time manipulation […]
Cyvore Featured in CTech: Out of Stealth and Into the Fight Against Modern Threats

The company has raised a total of $2.5 million to address the escalating threats in modern communication channels like Zoom, Teams, Slack, WhatsApp, and more. We’re proud to share that Cyvore has officially emerged from stealth, and the news is making waves. In an exclusive Startup Boarding Pass feature by CTech by Calcalist, our founders- Ori Segal (CEO), Yiftach Rotem (CPO), […]
The Dangers of OSINT and Spear-Phishing- Part 3
Man-in-the-Middle Attacks Assaf Reich Intro After we discussed OSINT, Phishing, and Spear-Phishing, Let’s try out a more involved attack vector and see how an open-source can be used to phish victims and steal their session credentials easily. This is important in order to keep up to date with current attack tools and to learn how […]
The Dangers of OSINT and Spear-Phishing-Part 2

Deploying the malicious payload Assaf Reich Hello, world! Assaf here once again, picking up where we left off in the first part of this series – OSINT reconnaissance. In this article I’ll demonstrate how we can use what we learned about our target, Eric Blum, to hack his computer and steal his personal data. Intro […]