Category: Blog

Breaking Down 2017’s Petya Ransomware Attack

The attack launched in 2017 by a Petya ransomware variant is hitting institutions in multiple countries, crippling transportation infrastructure like the airport and subway in Kiev, shutting down shipping terminals in the Netherlands, and compromising business networks from Russia’s Rosneft to British advertising giant WPP. There are still more questions

Petya Ransomware Spreading Fast With Same WannaCry Exploit

The Petya ransomware outbreak spreading fast in June 2017 is using ETERNALBLUE, the same exploit used in the WannaCry ransomware attack in May 2017, which was developed by the U.S. National Security Agency. This ransomware outbreak is a variant of Petya, which first emerged in early 2016 in the same

Think Browsers Protect You From Phishing Attacks?

Can you trust your browser to protect you from phishing? Do you know how to identify phishing links? We tackled that question in research for our special report on phishing, with the results below.  Everyone has their preferred browser—Internet Explorer (IE), Firefox, Chrome, and a few other lesser known browser

Malware & HTTPS: The Rising Trend in Malware Delivery

While over half of global web traffic is now encrypted, the real extent to which malware is being hidden in HTTPS has been an open question—until now. HTTPS is the standard protocol used for secure communication over computer networks. It works by encrypting traffic in between browsers and a website,

New Cyren Threat Report: Ransomware

Cyren has just released a new, revised special threat report on ransomware, which provides context and depth to the many ransomware-related headlines we’ve been bombarded with lately. 2016 was truly the “Year of Ransomware” — or, given recent events, will 2017 surpass it? Get Up to Speed  This report provides

Resilient IoT Guardian Unveiled to Protect Against Connected Threats

Resilient Network Systems and RunSafe Security Announce Strategic Partnership, New Approach to IoT SecurityMay 31, 2017 09:00 AM Eastern Daylight Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced a strategic partnership with RunSafe Security to offer a unique IoT security solution—Resilient IoT Guardian—for both new and existing

CEO and Chairman of Cyren Shares Insight On The Evolving Security Market

Lior Samuelson, Cyren CEO and Chairman, has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for users – especially those who seek better security and those on the move with their mobile devices. In this don’t want to

Locky 2? Jaff Ransomware Launched from Necurs Botnet

Despite WannaCrypt grabbing all the headlines, it is far from being the only ransomware in circulation. A second wave of Jaff ransomware is now being distributed by the stealthy Necurs botnet. Starting on Monday, May 8 (around 9:30 UTC), the Necurs botnet was harnessed to distribute a new Locky-style email

WannaCrypt Ransomware Spreads Like A Worm Via NSA Exploit

UPDATE (May 14): WannaCrypt/WannaCry is still being delivered through file sharing services over https at hxxps://transfer.sh and hxxps://down.xn--wda.fr/  __________________ The WannaCrypt ransomware (aka WannaCryptor, Wcrypt, and WannaCry) has managed to infect thousands of systems within just a few hours of its first appearance yesterday, with estimates on the order of

The ABCs of GDPR

The ABCs of GDPR Acronyms and abbreviations used to be relegated to those in the military and government: MDA (Missile Defense Agency), USPS (United States Postal Service), RAF (Royal Air Force). But the proliferation of social media sites like Twitter and Snapchat has moved acronyms into the mainstream: IMHO, YOYO,