Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known...
Cyren Security Blog Categories
Abusing Remote Administration Tools
The bad, worse and the horrible by Gunnar Guðmundsson and Axel Marinho Guðmundsson Introduction In this article, we look at a malware payload from an exploited...
Analyzing message metadata to protect against BEC attacks
Can analyzing message metadata help to protect organizations from becoming the victim of a successful BEC attack? Business Email Compromise (BEC) is an umbrella term...
The Hidden Costs of Phishing & BEC
By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO director at Fluid Networks to discuss how they dramatically reduced the time their security...
Email Hijacking Delivers Qakbot Malware
by Dexter To and Maharlito Aquino Introduction Originally a banking Trojan that existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware as a...
Example Analysis of Multi-Component Malware
by Kervin Alintanahin Recently, we have received an increase in the number of malicious email samples with password-protected attachments. The recent waves of attacks...
How the War in Ukraine Has Influenced the Scammers’ Underground
by Ira Chernous For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start...
The Resurgence of Emotet
by Kervin Alintanahim Password Protected Docs One of the most recent Emotet samples we received were emails with password protected attachments. Although the malicious...
Malicious Excel Add-in Variant Delivers Malware
By Floser Bacurio Jr XLL is an Excel Add-in extension file that provides ways to use third-party tools and functions that are not available in Microsoft Excel. It is...