Blog

Insights on Data Security & Threat Intelligence

Ransomware — Protect Yourself or Pay

Locky Ransomware in 2016  Ransomware has surged dramatically this year with the launch of a new variant called “Locky.” Delivered via massive malicious spam blasts (malspam), Locky represented 40% of all malware distributed worldwide during the first quarter of 2016. And as these attacks have become more sophisticated, attackers are

Read More >

Virus Bulletin: Keeping Up with the Stegoloader Trojan

As CYREN’s GlobalView security cloud churns through billions of pieces of information every day, our researchers are busy examining how certain threats work in order to make the whole automated system continuously smarter. Certain threats we find represent marked “advances” in intrusion techniques. A deep dive on the mechanics of

Read More >

Malware Newsmakers of 2015

New and old malware are showing increasing sophistication With as many as one million new malware threats being released each day, it comes as no surprise that many of these viruses are advanced and targeted. CYREN examined the various malware threats that appeared during 2015 and discovered some interesting trends,

Read More >

Not an April Fools’ Day Joke: Locky Ransomware

Locky is a new form of ransomware which has made headlines by holding three hospitals’ data hostage recently and encrypts a broad range of document and media formats before displaying ransom screens to infected users with payment instructions. A typical decrypt ransom is around $200 per infected system, with the

Read More >

Trust, security and privacy in IoT

I attended two workshops in February, IEEE End-to-End Trust and Security Workshop for the Internet of Things; and IEEE Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy. I gave a brief presentation at the IoT workshop on how what we’re doing at Resilient relates to the emerging IoT space.

Read More >