Category: Blog

Destroying the ROI of Cybercrime – Part 1

2015 will be another tough year in the continuing fight against cybercrime. Today’s Internet threat landscape is highly dynamic, as thousands of malicious actors disseminate hundreds of millions of global threats daily. While some actors are hacktivist organizations and even nation-states, the main threat remains that of well-funded cybercriminal gangs.

Honorable Billy Tauzin joins Board of Directors at Resilient Network Systems

SAN FRANCISCO, Feb. 13, 2014 /PRNewswire-iReach/ — Resilient Network Systems, Inc., the leading provider of Trust Network solutions, today announced that the company has appointed the Honorable Billy Tauzin as member of their Board of Directors. (Source Link) Tauzin had a long and distinguished 34-year elective career culminating in chairing

Innovative Architecture Addresses Student Digital Privacy Act Challenges – Press Release by RNS & NLET

Trust Networks support education systems’ compliance with new Federal and State legislation on data privacy (via Yahoo! Finance) SAN FRANCISCO, Jan. 27, 2015 /PRNewswire-iReach/ — Resilient Network Systems, Inc., a leading provider of advanced access control and privacy solutions, and the National Laboratory for Education Transformation (NLET), a Silicon Valley non-profit dedicated to modern

Phishing attack on popular German bank

Last week, the CYREN team detected a massive phishing attack on customers of the German bank Postbank, with more than 50,000 new phishing URLs detected within the first 24 hours. Phishing emails are traditionally sent to a massive group of people, in the hope that among the recipients are actual

Trust Network is ACT-IAC Igniting Innovation Finalist

I am very pleased Mr. Hyde agreed to join to my growing Board of Advisors.  His decades of experience in the d Resilient Network Systems, IJIS and their technology partners were selected as 1 of 30 Finalists for the ACT-IAC Igniting Innovation 2015 awards for top innovations in Government IT projects,

Not Malware: Some Apps are Just…Well…Apps

When you work in the cybersecurity industry, friends and family often share with you spam emails that come through their inboxes, examples of potential malware and phishing links, and news articles about the latest cybercrime headline. I always welcome these emails as it gives those of us at CYREN a

Classic Scams: Paypal and Dating Phishing Emails Just Won’t Go Away

When you analyze close to 15 BILLION pieces of email and Internet data daily, you see a lot of different cyberthreats. A rare few are unique and original, but the vast majority are variations on the same themes that have been used successfully by cybercriminals for the last few years.

Dunihi by Houdini—Middle East Coffee & Spice Company Targeted

Does malware take a coffee break? Perhaps not.  Dunihi malware was found this time embedded in an execute file intended for a leading Middle Eastern purveyor of coffee and spices named Badri & Hania (www.bah.ps). This malware is compiled in Microsoft intermediate language (MSIL) and has an icon that looks

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

NEWSFLASH: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas!

“The Cyber-Grinch and Cyber-Scrooge hated Christmas! The whole Christmas season! Now, please don’t ask why. No one quite knows the reason. It could be their monitors weren’t screwed on just right. It could be, perhaps, that their USB ports were too tight. But I think that the most likely reason