Author: tetiana.vashchenko@data443.com

No Hidden camera on fake Youtube/Vimeo pages – only hidden malware

Last week, CYREN detected interesting emails that contained links to fake video pages. We have included a screenshot of the email. The rough translation of the subject line is “hidden camera in their house”, and the Youtube link looks like it might deliver the goods – but of course the

Destroying the ROI of Cybercrime– Part 2

In the battle to defend against the ever-increasing volume and variety of threats, security solutions like firewalls, signature-based antivirus, and blacklisting may be ineffective. This is because the criminals know that the data that powers them may lag new threats by days or even weeks. Cybercriminals have now further raised

Destroying the ROI of Cybercrime – Part 1

2015 will be another tough year in the continuing fight against cybercrime. Today’s Internet threat landscape is highly dynamic, as thousands of malicious actors disseminate hundreds of millions of global threats daily. While some actors are hacktivist organizations and even nation-states, the main threat remains that of well-funded cybercriminal gangs.

Phishing attack on popular German bank

Last week, the CYREN team detected a massive phishing attack on customers of the German bank Postbank, with more than 50,000 new phishing URLs detected within the first 24 hours. Phishing emails are traditionally sent to a massive group of people, in the hope that among the recipients are actual

Not Malware: Some Apps are Just…Well…Apps

When you work in the cybersecurity industry, friends and family often share with you spam emails that come through their inboxes, examples of potential malware and phishing links, and news articles about the latest cybercrime headline. I always welcome these emails as it gives those of us at CYREN a

Classic Scams: Paypal and Dating Phishing Emails Just Won’t Go Away

When you analyze close to 15 BILLION pieces of email and Internet data daily, you see a lot of different cyberthreats. A rare few are unique and original, but the vast majority are variations on the same themes that have been used successfully by cybercriminals for the last few years.

Dunihi by Houdini—Middle East Coffee & Spice Company Targeted

Does malware take a coffee break? Perhaps not.  Dunihi malware was found this time embedded in an execute file intended for a leading Middle Eastern purveyor of coffee and spices named Badri & Hania (www.bah.ps). This malware is compiled in Microsoft intermediate language (MSIL) and has an icon that looks

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

NEWSFLASH: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas!

“The Cyber-Grinch and Cyber-Scrooge hated Christmas! The whole Christmas season! Now, please don’t ask why. No one quite knows the reason. It could be their monitors weren’t screwed on just right. It could be, perhaps, that their USB ports were too tight. But I think that the most likely reason

What Are BACS Remittance Emails? And How to Spot a Fake One

A couple of days ago, we received a spam email sample that was reported to contain a malicious attachment. The email content poses as a piece of remittance advice for a specific BACS payment.  What is BACS Remittance Advice?  So, let’s explore the definition of BACS remittance advice. In essence,