Category: Blog

New Threat Report: Everything you need to know about botnets

Cyren announces the release of the comprehensive cybersecurity report Botnets: The Clone Army of Cybercrime. This detailed look at a fundamental component of cybercrime infrastructure covers a wide range of botnet-specific topics, ranging from the basics of botnet architecture to in-depth analyses of botnet creation and evasion techniques. Report highlights

Yuletide spam and shopping scams breaking records

Fake Michael Kors shopping site ranks as the highest volume non-malware attack of 2016  Global business email traffic passing through Cyren’s cloud security operations is unfortunately reinforcing Scrooge’s initial take on Christmas, as analysis done this week shows that Christmas-themed email is almost entirely commercial or criminal. Instead of bringing

Why context is everything

We’ve had a great response from customers and the media (see eWeek, NetworkWorld, SiliconAngle) to last week’s release of Resilient Access 3.0. At the core of this new release is functionality that we are calling contextual access control. We believe that to securely share data and connect organizations we need to go beyond today’s narrow definition

On Demand Webinar – Botnets: the Clone Armies of Cybercrime

Last week we hosted a webinar titled “Botnets: The Clone Armies of Cybercrime.” Cyren security researchers, Avi Turiel and Geffen Tzur, discussed the history and current state of botnets and shared insights on malicious bot behavior, how to spot it, and what you can do to protect your organization. Some

Regular Expressions (RegEx) and ECM

Regular Expressions (RegEx) and ECM Language is a curious thing. Letters and symbols combine and form words to capture ideas. These ideas are strung together in sentences and paragraphs to increase knowledge, share feelings, and inspire others with new and fascinating ways of thinking. Every language has a rhythm and

Malicious Google Chrome extension spreads nude celebrity pdf’s to Facebook

A researcher at Cyren has found that a malicious Google Chrome extension is spreading nude celebrity PDFs to Facebook groups. A user is uploading a PDF document to groups with the name: ”Jessice_Alba_Leaked-sextapeVide_oSun_Dec_4_2016_22_99.mp4.pdf“ Opening the PDF reveals a nude picture with a ”Play“ button in the middle. Clicking on the

Resilient Network Systems Revamps Identity Access Management, Announces Resilient Access 3.0™

Contextual Access Control Powers Secure Information Sharing Across BoundariesDecember 08, 2016 09:00 AM Eastern Standard Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced the release of Resilient Access 3.0, a groundbreaking contextual access solution designed for the connected organization. Resilient Access 3.0 extends access capabilities

Resilient Network Systems Reimagines Identity Access Management for Secure External Sharing

Distributed Network Solution Goes Beyond Identity to Focus on Contextual AccessDecember 08, 2016 09:00 AM Eastern Standard Time SAN FRANCISCO–(BUSINESS WIRE)–As 2017 approaches, cloud computing, mobility and the Internet of Things continue to erode traditional organizational boundaries. The ability to share data freely is becoming a key driver of competitive

Why your email isn’t as secure as you think it is

Recent headlines are chock-full of reports of email phishing attacks by cybercriminals who outwit employees to obtain sensitive personal data and financial information. Under the guise of recognized web payment and productivity tool requests, hackers lure potential victims into clicking on fake email links that are designed to steal credentials

HTTPS is now over 50% of internet traffic – are we safer?

The era of “HTTPS Everywhere” After years of calling for “HTTPS Everywhere” on the web and encouraging websites to use HTTPS by default, Google officials say the effort has begun to pay off. New data released at the end of October 2016 shows that more than 50% of all pages