Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Trust Network is ACT-IAC Igniting Innovation Finalist

I am very pleased Mr. Hyde agreed to join to my growing Board of Advisors.  His decades of experience in the d Resilient Network Systems, IJIS and their technology partners were selected as 1 of 30 Finalists for the ACT-IAC Igniting Innovation 2015 awards for top innovations in Government IT projects,

Read More >

Not Malware: Some Apps are Just…Well…Apps

When you work in the cybersecurity industry, friends and family often share with you spam emails that come through their inboxes, examples of potential malware and phishing links, and news articles about the latest cybercrime headline. I always welcome these emails as it gives those of us at CYREN a

Read More >

Dunihi by Houdini—Middle East Coffee & Spice Company Targeted

Does malware take a coffee break? Perhaps not.  Dunihi malware was found this time embedded in an execute file intended for a leading Middle Eastern purveyor of coffee and spices named Badri & Hania (www.bah.ps). This malware is compiled in Microsoft intermediate language (MSIL) and has an icon that looks

Read More >

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

Read More >

What Are BACS Remittance Emails? And How to Spot a Fake One

A couple of days ago, we received a spam email sample that was reported to contain a malicious attachment. The email content poses as a piece of remittance advice for a specific BACS payment.  What is BACS Remittance Advice?  So, let’s explore the definition of BACS remittance advice. In essence,

Read More >

Wiper family of malware targeting Sony Pictures entertainment grows

W32/Wiper.C SHA1 – CB39C8639A2F74A3424D040D22A856859AB559A8 Similar to W32/Wiper.A, this version is also is being distributed by the people behind this threat. Depending on how it is distributed, the victim may launch different file names; the most common are diskpartmg16.exe and dpnsvr16.exe. For this example we will use “diskpartmg16.exe”. The “diskpartmg16.exe” version

Read More >