Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

IAM Concept of the Week: FIDO (Fast Identity Online)

IAM Concept of the Week blog series – Each week we define and explain the significance of a concept in the world of Identity and Access Management. This week our IAM Concept of the Week deals with FIDO (Fast Identity Online), an authentication technology largely based on biometrics. FIDO is supported by

Read More >

Streamlining the Serious Business of Due Diligence

Streamlining the Serious Business of Due Diligence Although the concept of “due diligence” has become widely accepted as any painstakingly detailed process of investigating and verifying the validity of a fact or situation, the phrase takes on a more profound level of meticulous research when used in the context of

Read More >

Concept of the Week: SAML, OAuth2 and OpenID Connect

Introducing our new IAM Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management.This week let’s talk about 3 protocols – SAML, OAuth and OpenID Connect – that are often mentioned when discussing authentication

Read More >

Fake bank transfer emails stealing Bitcoin and passwords

Cyren has discovered an outbreak of malware which is stealing passwords as well as Bitcoin from crypto-currency wallets on PCs. This versatile keylogger malware is being delivered as an attachment to phony bank transfer emails, which inform the recipient that they have received a deposit. The emails are originating primarily

Read More >

Email Security Survey: 75% of Companies Hacked in Past Year

A new survey conducted by Osterman Research and co-sponsored by Cyren shows that 75% of businesses surveyed incurred a security breach in the past 12 months. The top two culprits? Email phishing attacks infected systems at 37% of the companies, while 24% of respondents suffered successful ransomware attacks through file

Read More >

The Rise of Botnets

The year 2016 was certainly notable for Locky and the rise of ransomware, but these last months our attention has been drawn to a fundamental element of the underlying criminal cyber infrastructure — botnets.  In July, major attacks using LizardStresser, a distributed denial-of-service (DDoS) botnet using IoT devices, were launched

Read More >

Making Resolutions vs. Transforming Business

Making Resolutions vs. Transforming Business We all know how difficult it can be to keep your New Year’s resolutions. This is no different for businesses who face the issues of reducing costs, organizing systems, and locating files. The good news: You do not need resolutions to address these issues. What you need

Read More >

New Threat Report: Everything you need to know about botnets

Cyren announces the release of the comprehensive cybersecurity report Botnets: The Clone Army of Cybercrime. This detailed look at a fundamental component of cybercrime infrastructure covers a wide range of botnet-specific topics, ranging from the basics of botnet architecture to in-depth analyses of botnet creation and evasion techniques. Report highlights

Read More >

Yuletide spam and shopping scams breaking records

Fake Michael Kors shopping site ranks as the highest volume non-malware attack of 2016  Global business email traffic passing through Cyren’s cloud security operations is unfortunately reinforcing Scrooge’s initial take on Christmas, as analysis done this week shows that Christmas-themed email is almost entirely commercial or criminal. Instead of bringing

Read More >