Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

The World of Limitless Identity

When I joined Resilient Network Systems as CEO roughly a year and a half ago, I was very excited about how the company was revolutionizing the world of information sharing and creating a safer Internet.  Being able to safeguard the data being accessed, while enabling more sharing and collaboration is

Read More >

Bartallex special delivery: Fareit and Vawtrak

Earlier this year we witnessed several enterprises being targeted by Bartallex in spam emails. Bartallex uses Microsoft Word documents and social engineering techniques to trick enterprise users into opening and executing the embedded macro code in the document. When enabled, the macro code downloads and executes banking malware Dridex, a

Read More >

Rise of Malicious Resumes in the Fall Hiring Season

Summer is finally over and it’s time for employers to refocus and take advantage of the remaining budget for the year to get new recruits in before the holiday season starts. Essentially, fall season is the time when people like fresh college graduates come into the market looking for new

Read More >

Domain Validation (DV) SSL Certificate used for PayPal Phishing

As users become more aware of phishing and data theft, they become more cautious. Unfortunately as users become more cautious, attackers must become more devious. In a recent discovery, we found a phishing website that had been issued a valid SSL Certificate. SSL Certificates are small data files that activate

Read More >

Q2 Cyber Threats Report: The Enterprise Under Attack

While high-profile data breaches may have declined in frequency during the quarter, they most definitely rose in impact. The fallout from the US Government Office of Personnel Management (OPM) data breaches continues to be felt, the latest example of which being that GSA has placed contracts for post-breach protection for

Read More >

Phishing for the big phish in United Kingdom’s plentiful waters

In 2014, the phishing URLs tracked by CYREN increased dramatically, rising 233% from the previous year. Why did this number increase? One reason is the potential for monetary gain. Cyber criminals use phishing attacks to steal personally sensitive and identifiable information from users. Sometimes this is to gain access to

Read More >

New Tricks of Macro Malware

In the past few months, we have noticed a rise in spam emails that have an attachment of “.DOC” extension filename but actually is a “.MHT” file. This trending trick seems to be a new way to spread macro malware. A file with “.MHT” extension is a Web page archive

Read More >

Lessons Learned from the Slack & Hipchat Breaches

In late March Slack confirmed they had suffered a security breach where “there was unauthorized access to a Slack database storing user profile information”. Slack is a recently launched team collaboration tool that offers organizations a way to simplify communications, file-sharing, project management and more. Organizations sign up their employees

Read More >