Category: Blog

Interview with a Botnet Hunter

In this interview, Cyren botnet expert Geffen Tzur explains how botnets work and gives a view from the trenches on successes and challenges in fighting botnet cybercrime. What defines a botnet? Doesn’t all malware “phone home”? A botnet is defined as a network of infected computers set up to perform

Analysten-Bericht: Phishing-Angriffe sind ein Geschäftsproblem, kein IT-Problem

Überall wird über erfolgreiche Phishing-Angriffe berichtet. Diese stellen eine der größten Sorgen für IT-Manager dar – wie aber lässt sich der wirtschaftliche Nutzen einer zusätzlichen, fortschrittlicheren E-Mail- und Web-Security verdeutlichen? In einem neuen Bericht hat der Analyst der Security-Branche, Derek Brink von der Aberdeen Group, die Zahlen zusammengestellt und die

Do You Know the New PII Rights under GDPR?

Do You Know the New PII Rights under GDPR? What is your current address? What was the yearly salary of your last position? What is your Social Security (national insurance) number? Consider how many PII (personally identifiable information) questions your organization asks for background checks of individuals being vetted as

New Scarab Ransomware Using Necurs-as-a-Service

13.3 million Scarab ransomware emails detected in one day The new Scarab ransomware being distributed via email by the Necurs botnet appears to come from scanning devices or services like HP, Epson or Lexmark. While there are similarities to the Necurs-distributed Locky ransomware, Scarab seems to have been developed by

FileFacets in MicroScope Article: GDPR influencing channel relationships

FileFacets in MicroScope Article: GDPR influencing channel relationships MicroScope recently wrote on how looming GDPR regulations mean resellers are starting to ensure they have a complete data protection solution, mentioning our recent partnership announcement with Nuvias.Read the full article here.

10 Cyber Threat Terms Every IT Manager Should Know

Do you know the difference between spear phishing and clone phishing and…just plain phishing? Or adware and malvertising? Check out the list below of the top 10 threat terms every employee should be familiar with, and familiarize yourself with more threat terms in Cyren’s new online Cyber Threat Dictionary in

FileFacets Appoints Nuvias as EMEA Cyber Security Distributor

OTTAWA, Nov. 22, 2017 /CNW/ – FileFacets, a privacy compliance and enterprise analytics company, today announces the appointment of European IT distributor Nuvias as its sole cyber security distributor in EMEA. Through the partnership, FileFacets aims to drive international expansion and meet growing demand for its Enterprise ID data discovery products. FileFacets Enterprise