Blog

Insights on Data Security & Threat Intelligence

New Cyren Threat Report: Ransomware

Cyren has just released a new, revised special threat report on ransomware, which provides context and depth to the many ransomware-related headlines we’ve been bombarded with lately. 2016 was truly the “Year of Ransomware” — or, given recent events, will 2017 surpass it? Get Up to Speed  This report provides

Read More >

Resilient IoT Guardian Unveiled to Protect Against Connected Threats

Resilient Network Systems and RunSafe Security Announce Strategic Partnership, New Approach to IoT SecurityMay 31, 2017 09:00 AM Eastern Daylight Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced a strategic partnership with RunSafe Security to offer a unique IoT security solution—Resilient IoT Guardian—for both new and existing

Read More >

Locky 2? Jaff Ransomware Launched from Necurs Botnet

Despite WannaCrypt grabbing all the headlines, it is far from being the only ransomware in circulation. A second wave of Jaff ransomware is now being distributed by the stealthy Necurs botnet. Starting on Monday, May 8 (around 9:30 UTC), the Necurs botnet was harnessed to distribute a new Locky-style email

Read More >

WannaCrypt Ransomware Spreads Like A Worm Via NSA Exploit

UPDATE (May 14): WannaCrypt/WannaCry is still being delivered through file sharing services over https at hxxps://transfer.sh and hxxps://down.xn--wda.fr/  __________________ The WannaCrypt ransomware (aka WannaCryptor, Wcrypt, and WannaCry) has managed to infect thousands of systems within just a few hours of its first appearance yesterday, with estimates on the order of

Read More >

The ABCs of GDPR

The ABCs of GDPR Acronyms and abbreviations used to be relegated to those in the military and government: MDA (Missile Defense Agency), USPS (United States Postal Service), RAF (Royal Air Force). But the proliferation of social media sites like Twitter and Snapchat has moved acronyms into the mainstream: IMHO, YOYO,

Read More >

Google Docs Phishing Attack Worms Its Way In

Repeatedly referred to in the press as “massive,” the Google Docs attack which has been the talk of the security blogosphere and even mainstream media this past week appears to have sent invitation emails to an estimated “less than 0.1%” of Gmail users, according to Google’s own statement, which is

Read More >

Infosec Island: When Is Apple.com Not Apple.com?

To get up to speed on the latest technique used by phishing site operators to present legitimate-but-fake (!) web sites, check out Cyren security researcher Magni Sigurdsson’s column in Infosec Island, which details how cybercriminals are exploiting a browser capability for representing non-Latin characters to make users think they really

Read More >

Is Monday the Worst Day of the Week…for Security?

The IT manager responsible for information security at an enterprise account — let’s call him “Steve” — recently shared an interesting story. In general, he felt that they handle security pretty well, but he detailed one challenge that they haven’t yet been able to solve — users roaming outside the

Read More >