Category: Blog

Best Practices for Stopping Ransomware

With the recent return of Locky and continued growth of ransomware and ransomware-as-a-service, there is a good chance you personally know an individual or company that has experienced such an attack or another similar threat. If you work in the computer or security industry, you might also often be asked

What is PII? What Should We Do About It?

What is PII? What Should We Do About It? Dreams and fantasies are often referred to as “pie in the sky” thinking—nice to ponder, but, realistically speaking, not likely to happen. A generation ago we would have thought the digitization of info would usher in a Utopian paperless age when

New Cyren Threat Report: The Malware Wars

If you want to know what a cyber-war looks like, read the news. And if you want to get up to speed quickly and try to make sense of all that news, I recommend downloading our new special report on malware, with a special nod to the included interview of

Trickbot Banking Trojan Making Phishing More Real

Trickbot is back, new and improved, and was found targeting customers of Lloyds Bank of the UK last week in a renewed phishing campaign intended to steal online banking users’ security codes. The updated version of the malware, which first appeared last year, uses new techniques to make it even

What is a Botnet Attack? 6 Ways to Identify and Prevent It

  Botnets have become a trend in 2022 and will likely continue to be a threat in 2023. According to Spamhaus’s Q4 2021 Botnet Threat Update, they reported there was a 23% increase in botnet C&C attacks from Q3 to Q4 in 2021. Additionally, there were 300,000 instances of Emotet

Webinar – Identity and Data Governance!

Join us for the webinar “Identity & Data Governance – 5 Steps to Reliable and Accurate Compliance in the Cloud” on August 3rd at 2 pm ET | 1 pm CT | 11 am PT | 6pm GMT. Identity and Security Compliance experts will review how Identity and Data can

Distributed Computing Systems: Legitimate & Useful Botnets

  Although the term ‘botnet’ is generally associated with cybercrime and maliciousness, it should come as no surprise that there are, in fact, fully legitimate and entirely useful botnets—better known as “distributed computing systems”—at work around the globe. In fact, someone you know may even have willingly allowed their computer

What is the 15-Minute Botnet?

Becoming an Internet criminal is getting easier and easier. With only a few hundred dollars in hand and an Internet connection, anyone can obtain the software and support to build a botnet. After the initial outlay of cash, a criminal botmaster can quickly gain a significant return on investment through

Breaking Down 2017’s Petya Ransomware Attack

The attack launched in 2017 by a Petya ransomware variant is hitting institutions in multiple countries, crippling transportation infrastructure like the airport and subway in Kiev, shutting down shipping terminals in the Netherlands, and compromising business networks from Russia’s Rosneft to British advertising giant WPP. There are still more questions

Petya Ransomware Spreading Fast With Same WannaCry Exploit

The Petya ransomware outbreak spreading fast in June 2017 is using ETERNALBLUE, the same exploit used in the WannaCry ransomware attack in May 2017, which was developed by the U.S. National Security Agency. This ransomware outbreak is a variant of Petya, which first emerged in early 2016 in the same