Close this search box.

Category: cyren

Test the Effectiveness of Your Email Security

Do you keep seeing phishing emails getting through to users, and wish you could quantify how effective your email security is—or isn’t? Email is the main vehicle for introducing malware into an organization, and is practically synonymous with phishing these days, so it is a sensible idea to get a

6 Phishing Techniques Driving Phishing-as-a-Service Operations

The phishing-as-a-service industry is making easy-to-use phishing attack tools and even full campaigns available at cheap rates. Full-service subscription prices typically vary from $50 to $80 per month, depending on the level of service, and realistic phishing web kits are available to download for as little as $50. Cyren’s research

Attack Exploits Vulnerability in Half of Email MTAs Globally

Attacks predicted for a freshly reported email server vulnerability have come true in less than a week. If you’re an email administrator, you should be aware of the attacks this week targeting a vulnerability in the Exim MTA server code (versions 4.87 to 4.91), the objective of which is to

It’s Back! Facebook Cryptominer Worm Reemerges

Digmine Campaign Redux  Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant today—referring to both the blog and the malware. At the time we had set ourselves the task of analyzing part of the 2017 Digmine campaign that

Phishing Targeting Real Estate Firms

Stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper and blog headlines. Stories like the cybercriminals who stole client contact information from a DC-area real estate company, and with the information then created a “business email compromise” (BEC) scam, which resulted in $1.5 million

How to Identify Apple Phishing Email Scams

Recently, a lot of phishing campaigns have been moving the embedded links from the body of an email into an attachment, to increase the odds of evading detection. We theorize this is a kind of “social engineering” ploy to move the user along quickly and get them into a clicking

Emotet: From a Banking Trojan to One of the Most Advanced Botnets

In 2014, the Emotet malware started as a banking Trojan targeting European bank customers. Back then, nobody expected this malware would evolve into one of the most dangerous botnets in the world. We’ve been getting a lot of questions about the Emotet malware and its eponymous botnet, as its versatility

Emotet: Von einem Bank-Trojaner zu einem der fortgeschrittensten Botnets

2014 begann die Emotet-Malware als Bank-Trojaner, der europäische Bankkunden ins Visier nahm. Damals erwartete niemand, dass sich diese Malware zu einem der gefährlichsten Botnets weltweit entwickeln würde. Uns haben viele Fragen zur Emotet-Malware und dem gleichnamigen Botnet erreicht. Seine Vielseitigkeit hat dazu geführt, dass es weit verbreitet ist (eine Analyse

Ransomware Overshadowed by Phishing, But It’s Not Dead Yet

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a single ransomware out there to capture the collective imagination like Locky did in 2016, but don’t be misled—ransomware continues alive and well. Recent targeted Ryuk