Cyren Security Blog

Subscribe to this Blog

Self Defense: How to Detect A Botnet on Your Network

by John Callon

Botnets Malware Threat Analysis Web Security

Cyren blocks outbound bot communications and helps identify where the bots are in order to remove them. Learn how to recognize the warning signs.

Build, buy, or lease? The 15-minute botnet

by Avi Turiel

Botnets Malware Threat Analysis Web Security

Becoming an Internet criminal is getting easier and easier. With only a few hundred dollars in hand and an Internet connection, anyone can obtain the software and support to build a botnet. And after the initial outlay of cash, a criminal botmaster can quickly realize a significant return on investment through malware distribution, spam, phishing, and even DDoS attacks.

Breaking Down Today’s Petya Ransomware Attack

by Magni Reynir Sigurðsson

Malware Ransomware Threat Analysis

The Petya ransomware attack today uses the EternalBlue exploit, which is the same exploit that was used in the WannaCry attack to spread and infect the victim’s computer with a nasty ransomware.

Petya Ransomware Spreading Fast With Same WannaCry Exploit

by Magni Reynir Sigurðsson

Email Security Malware Ransomware Security Research & Analysis Web Security

The Petya ransomware outbreak spreading fast today is using ETERNALBLUE, the same exploit used in the WannaCry ransomware attack in May, which was developed by the U.S. National Security Agency.

Malware is Moving Heavily to HTTPS

by Arna Magnúsardóttir

Malware Threat Analysis

Cyren found that HTTPS is being utilized in 37% of all malware. SSL inspection is key to protecting your users and network from threats that use HTTPS.

New Cyren Threat Report: Ransomware

by John Callon

Cyberthreat Report Email Security Malware Ransomware Security Research & Analysis Web Security

Cyren has just released a new, revised special threat report on ransomware, which provides context and depth to the many ransomware-related headlines we’ve been bombarded with lately. 2016 was truly the “Year of Ransomware” – or will 2017 surpass it?