Blog

Insights on Data Security & Threat Intelligence

Crypter Malware: A Deep Dive Into NSIS-Based Crypters

We have been observing that malware is being distributed via NSIS-based crypter. Malware such as FormBook, AgentTesla, GULoader, just to name a few, have been using NSIS as their loader. We have seen several ways of obfuscation implemented with the installer that decrypts and directly loads the malware into memory

Read More >

Glossary of Cyber Security Terms and Terminologies

With cyber-attacks continuing to be one of the greatest threats faced online, there is an increased discussion surrounding cybersecurity and privacy protection. Companies spanning industries are increasingly concerned about protecting sensitive information and data from manipulation. However, in order to get involved with this important discussion, there needs to be

Read More >

19 Best Practices for Securing Microsoft Office 365

Microsoft Office 365 is a massive platform that many businesses use. It is considered the world’s most popular office suite of productivity tools. Unfortunately, this means it is a hugely popular target for cyber-attackers as well.  Microsoft Office 365 has a variety of effective built-in security features but it often

Read More >

What is Spyware?

Spyware is a type of malicious software that enters your computer or mobile device without consent in order to gain access to your personal information and data and relays it to a third party. Considered a type of malware, spyware spies on the computer user, capturing keystrokes, emails, documents, or

Read More >

Cyren’s Email Security Engine for IP Reputation

The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions. Messaging security vendors can achieve unprecedented performance and detection levels, and block zombie traffic before it even enters customer networks.

Read More >

Blocking Outbound Spam with Cyren’s Email Security Engine

Customer loss, as well as operational cost overruns, brand and reputational damage through blacklists, and even potential lawsuits are a few of the possible consequences service providers face as a result of spam coming from inside their network. Since the problem differs from inbound spam, dealing with outbound spam effectively

Read More >

Inbound Anti-Spam Solution: Catch Outbreaks with Cyren

The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors. Proven across multiple scores of deployments that happen across the globe, Cyren’s Email Security Engine for Inbound Anti-Spam delivers industry-leading detection performance to Microsoft Office 365 users,

Read More >

The Cost of NOT Getting Phished

Phishing campaigns continue to become more targeted and sophisticated, evading email gateways and Microsoft 365 Defender, and forcing businesses to increasingly rely on employees to spot suspicious messages. The statistics of potential data breaches are alarming – with some estimating that cybercrime costs will grow 15 percent per year in

Read More >