Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Windows Media Player DRM Used for Malware (Again..)

Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen media. Now use is again being made of Digital Rights Management (DRM) functionality — designed to prevent piracy — to distribute malware. The new attack, brought to Cyren’s

Read More >

Duplicates: Files vs Records & Why You Need to Know the Difference

Duplicates: Files vs Records & Why You Need to Know the Difference Within each database, and eventually, each enterprise content management (ECM) system, businesses must manage the limits of storage. Relational databases are filled with countless records and files; unfortunately, many of those are duplicated, which take up much-needed storage

Read More >

Locky Adds New File Format and Attacks UK

Cyren caught a new Locky email spam campaign today which uses a new tactic, delivering the Locky downloader script component as an HTML application, specifically HTA files. The emails are disguised as voice message notifications sent by Peach Telecom, which suggests that the campaign is targeting users in the UK. 

Read More >

Locky Morphs Again: Now Delivered as DLL

We are now seeing a new wave of Locky, which has yet again updated its delivery mechanism by adding another layer of obfuscation to its downloader script, which Cyren detects as JS/Locky.AT!Eldorado. We previously reported our detection of key changes in Locky’s methods on June 27 (new sandbox evasion techniques),

Read More >

Where is Resilient headed in September?

As our SF summer winds down and we head into fall, things are heating up, and we’re not just talking about the temperature. The Resilient team is headed to 4 conferences in September, covering both government and enterprise markets, on both coasts. We are looking forward to reconnecting and meeting new

Read More >

Clean Up ROT! Make ECM Really Work For Your Company

Clean Up ROT! Make ECM Really Work For Your Company Holding on to items you don’t need around the house can cause a lot of clutter. Outdated paper documents, unwanted hostess gifts, broken knick-knacks you may or may not get around to gluing back together – usually it’s all just

Read More >

New Cyberthreat Report: A Deep Dive on Phishing

I can’t remember the last time I read the news where I didn’t see a headline that involved a business becoming a victim of cybercrime due to phishing. Both big and small organizations are targets, with CEOs falling victim to “whaling” (phishing targeted at executive staff) as often as regular

Read More >