Select Page

Cyren Security Blog

Featured Post

Latest Posts

A Year of NSIS-based Cryptors

By Floser Bacurio Jr Over the past several years, we have been observing that malware is being distributed via NSIS-based cryptor. Malware such as FormBook, AgentTesla, GULoader, just to name a few, have been using NSIS as their loader. We have seen several ways of...

19 Best Practices for Securing Microsoft Office 365

Microsoft Office 365 is a massive platform that many businesses use. It is considered the world's most popular office suite of productivity tools. Unfortunately, this means it is a hugely popular target for cyber-attackers as well.  Microsoft Office 365 has a variety...

What is Spyware?

Spyware is a type of malicious software that enters your computer or mobile device without consent in order to gain access to your personal information and data and relays it to a third party. Considered a type of malware, spyware spies on the computer user, capturing...

Cyren’s Email Security Engine for IP Reputation

The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions. Messaging security vendors can achieve...

Inbound Anti-Spam Solution: Catch Outbreaks with Cyren

The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors. Proven across multiple scores of deployments that happen across the globe, Cyren’s Email Security...