Category: Blog

Not Malware: Some Apps are Just…Well…Apps

When you work in the cybersecurity industry, friends and family often share with you spam emails that come through their inboxes, examples of potential malware and phishing links, and news articles about the latest cybercrime headline. I always welcome these emails as it gives those of us at CYREN a

Classic Scams: Paypal and Dating Phishing Emails Just Won’t Go Away

When you analyze close to 15 BILLION pieces of email and Internet data daily, you see a lot of different cyberthreats. A rare few are unique and original, but the vast majority are variations on the same themes that have been used successfully by cybercriminals for the last few years.

Dunihi by Houdini—Middle East Coffee & Spice Company Targeted

Does malware take a coffee break? Perhaps not.  Dunihi malware was found this time embedded in an execute file intended for a leading Middle Eastern purveyor of coffee and spices named Badri & Hania (www.bah.ps). This malware is compiled in Microsoft intermediate language (MSIL) and has an icon that looks

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

NEWSFLASH: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas!

“The Cyber-Grinch and Cyber-Scrooge hated Christmas! The whole Christmas season! Now, please don’t ask why. No one quite knows the reason. It could be their monitors weren’t screwed on just right. It could be, perhaps, that their USB ports were too tight. But I think that the most likely reason

What Are BACS Remittance Emails? And How to Spot a Fake One

A couple of days ago, we received a spam email sample that was reported to contain a malicious attachment. The email content poses as a piece of remittance advice for a specific BACS payment.  What is BACS Remittance Advice?  So, let’s explore the definition of BACS remittance advice. In essence,

Wiper family of malware targeting Sony Pictures entertainment grows

W32/Wiper.C SHA1 – CB39C8639A2F74A3424D040D22A856859AB559A8 Similar to W32/Wiper.A, this version is also is being distributed by the people behind this threat. Depending on how it is distributed, the victim may launch different file names; the most common are diskpartmg16.exe and dpnsvr16.exe. For this example we will use “diskpartmg16.exe”. The “diskpartmg16.exe” version

Wiper.A: Follow-up Analysis of Malware Targeted at Sony Pictures Entertainment

Last week, CYREN issued an early analysis of the Wiper A. Trojan/Backdoor malware, within less than 24-hours of malware identification. After further analysis, we have also found some interesting details that suggest that this malware is really targeted to the Sony Pictures Entertainment Company’s network. In our initial analysis we

The Internet of Everything: Be Prepared!

Imagine the Internet of Everything—a world where every single item you touch, from a light bulb to the brake system in your car, has a microcomputer and IP address. All the data stored on the device is accessible 24/7 from anywhere in the world. Now imagine the type of information