Author: tetiana.vashchenko@data443.com

Facebook Users Hit With Coinminer Malware

The value of Bitcoin virtual currency just hit a new all-time high, and with it an increasing number of malware threats are targeting users to “borrow” their PC’s CPU for use in mining the precious cryptocurrency, something we last wrote about in October here. Once executed, a significant spike in

Interview with a Botnet Hunter

In this interview, Cyren botnet expert Geffen Tzur explains how botnets work and gives a view from the trenches on successes and challenges in fighting botnet cybercrime. What defines a botnet? Doesn’t all malware “phone home”? A botnet is defined as a network of infected computers set up to perform

Analysten-Bericht: Phishing-Angriffe sind ein Geschäftsproblem, kein IT-Problem

Überall wird über erfolgreiche Phishing-Angriffe berichtet. Diese stellen eine der größten Sorgen für IT-Manager dar – wie aber lässt sich der wirtschaftliche Nutzen einer zusätzlichen, fortschrittlicheren E-Mail- und Web-Security verdeutlichen? In einem neuen Bericht hat der Analyst der Security-Branche, Derek Brink von der Aberdeen Group, die Zahlen zusammengestellt und die

New Scarab Ransomware Using Necurs-as-a-Service

13.3 million Scarab ransomware emails detected in one day The new Scarab ransomware being distributed via email by the Necurs botnet appears to come from scanning devices or services like HP, Epson or Lexmark. While there are similarities to the Necurs-distributed Locky ransomware, Scarab seems to have been developed by

10 Cyber Threat Terms Every IT Manager Should Know

Do you know the difference between spear phishing and clone phishing and…just plain phishing? Or adware and malvertising? Check out the list below of the top 10 threat terms every employee should be familiar with, and familiarize yourself with more threat terms in Cyren’s new online Cyber Threat Dictionary in

How Do You Know Your Email Security Is Working?

When was the last time you assessed the effectiveness of your email security? Email is the main vehicle for introducing malware into an organization, so it is imperative that you do so. Here at Cyren we know how eye-opening such an evaluation can be, because during September and October, we

Fake Invoice Carries “Rescoms” Malware

Emails containing malicious attachments equipped with keyloggers and screen capture capabilities are targeting businesses worldwide, with noted attacks in Asia, Russia, and the Middle East. The campaign is designed to look like it comes from real affiliates and employees working for a well-known pharmaceutical distributor in order to make the

Stealing Tax Refunds Soaring Worldwide

There appear to be only two things that are certain in life: death and cybercriminals trying to steal your tax refund. As governments have moved tax systems online to facilitate life for the taxpayer, refund scams using phishing and social engineering to obtain personal financial information have become epidemic, with