Search
Close this search box.

Category: cyren

CYREN’s 2016 Cyberthreat Report: Malware Increases – But Phishing Explodes

2015 Statistics: Android, Phishing, Malware, Spam CYREN cyber intelligence powers the security solutions of over 200 of the largest IT and security technology providers in the world. As the security provider to the security industry, CYREN maintains the broadest and deepest real-time Internet threat database in the world and applies

Not an April Fools’ Day Joke: Locky Ransomware

Locky is a new form of ransomware which has made headlines by holding three hospitals’ data hostage recently and encrypts a broad range of document and media formats before displaying ransom screens to infected users with payment instructions. A typical decrypt ransom is around $200 per infected system, with the

Introducing CYREN’s 2016 Cyberthreat Report

Detection is NOT the New Prevention There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It’s

You Got Crypto Mail

In a spam campaign that we have been seeing at the end of the year, malware actors were sending out Courier Delivery Notification themed e-mails to lure users into falling prey to the infamous CryptoWall ransomware.  These attached zip files in these e-mails contained malicious javascript files, which were lamely

ENCORE: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas again!

You might remember CYREN’s previous Cyber-Grinch and Cyber-Scrooge blog article from 2014… Tis the time of the year when this article’s content becomes relevant again!  The Scams of Christmas Past, Present, and Future In 2015, the cyber-criminals, alias Cyber-Grinch and Cyber-Scrooge are active and creative in their goal of making

Sandbox Array and APT in Asia Pacific

Year of the Breach 2014 was called by many the “year of the breach”. Throughout the Asia Pacific region , high-profile cases hit the headlines. In Jan 2014, the personal data of 20 million South Koreans — or 40% of the country’s population — was stolen, sparking outrage as worried

Hidden Malware and the Ghosts of Mobile Technology

Android Malware “GhostPush” Already discovered packaged into 39 different Android apps, “GhostPush” (sometimes also called “Rootnik”) malware turns an infected device into a platform for the installation of adware, unwanted homescreen links, and further malware. Victims have found the malware to be deeply entrenched and difficult to remove.  Malicious Code

Phishing Emails Targeting Chinese Users

Chinese users – a very attractive target for phishing attacks Chinese people are increasingly getting online and adopting mobile services. 2014 was a pivotal year, with the massive adoption of mobile services by over 560 million users. It is anticipated that more than half of the entire population of China

Q3 Cyber Threat Report: Cyber Security Awareness

Cyber Security Awareness Month October was Cybersecurity Awareness Month. Out of curiosity, I looked online to see what sort of information was available on the topic. I wasn’t surprised by the results; there were thousands of links, including newspaper articles, infographics, and general awareness notices, with sources that included the

Bartallex special delivery: Fareit and Vawtrak

Earlier this year we witnessed several enterprises being targeted by Bartallex in spam emails. Bartallex uses Microsoft Word documents and social engineering techniques to trick enterprise users into opening and executing the embedded macro code in the document. When enabled, the macro code downloads and executes banking malware Dridex, a