Category: Blog

Windows Media Player DRM Used for Malware (Again..)

Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen media. Now use is again being made of Digital Rights Management (DRM) functionality — designed to prevent piracy — to distribute malware. The new attack, brought to Cyren’s

Duplicates: Files vs Records & Why You Need to Know the Difference

Duplicates: Files vs Records & Why You Need to Know the Difference Within each database, and eventually, each enterprise content management (ECM) system, businesses must manage the limits of storage. Relational databases are filled with countless records and files; unfortunately, many of those are duplicated, which take up much-needed storage

Locky Adds New File Format and Attacks UK

Cyren caught a new Locky email spam campaign today which uses a new tactic, delivering the Locky downloader script component as an HTML application, specifically HTA files. The emails are disguised as voice message notifications sent by Peach Telecom, which suggests that the campaign is targeting users in the UK. 

Locky Morphs Again: Now Delivered as DLL

We are now seeing a new wave of Locky, which has yet again updated its delivery mechanism by adding another layer of obfuscation to its downloader script, which Cyren detects as JS/Locky.AT!Eldorado. We previously reported our detection of key changes in Locky’s methods on June 27 (new sandbox evasion techniques),

Where is Resilient headed in September?

As our SF summer winds down and we head into fall, things are heating up, and we’re not just talking about the temperature. The Resilient team is headed to 4 conferences in September, covering both government and enterprise markets, on both coasts. We are looking forward to reconnecting and meeting new

Clean Up ROT! Make ECM Really Work For Your Company

Clean Up ROT! Make ECM Really Work For Your Company Holding on to items you don’t need around the house can cause a lot of clutter. Outdated paper documents, unwanted hostess gifts, broken knick-knacks you may or may not get around to gluing back together – usually it’s all just

New Cyberthreat Report: A Deep Dive on Phishing

I can’t remember the last time I read the news where I didn’t see a headline that involved a business becoming a victim of cybercrime due to phishing. Both big and small organizations are targets, with CEOs falling victim to “whaling” (phishing targeted at executive staff) as often as regular

CYREN Survey Benchmarks Security at SMBs — 71% Hacked in the Past Year!

CYREN teamed with Osterman Research to ask questions of IT and security professionals at over 300 small and medium-sized businesses during June, and the resulting report is available for download here, and discussed in last week’s webinar available here. There are a lot of surveys and reports and white papers

Resilient Partners with FinalCode DRM to Protect Data Everywhere

The digital right management sector is an excellent fit for Resilient’s adaptive access management capabilities, and we are very excited to announce our partnership with FinalCode. The combined power of our two technologies will help enterprises and government agencies securely share files and collaborate across boundaries, by ensuring that the right users