Cyren Security Blog

Subscribe to this Blog

Yuletide spam and shopping scams breaking records

by John Callon

Email Security Security Research & Analysis Spam

Global email traffic passing through Cyren’s cloud security operations is shows that Christmas-themed email is almost entirely commercial or criminal.

New Cyberthreat Report: A Deep Dive on Phishing

by Lior Kohavi

Phishing Security Research & Analysis

A recent Osterman Research survey conducted on behalf of Cyren found phishing to be the top threat category for small- to medium-sized businesses (up to 3,000 employees), with 43% suffering a phishing breach in the last 12 months. ...

Locky Ransomware Now Embedded in Javascript

by Maharlito Aquino

Ransomware Security Research & Analysis Threat Analysis

The new wave of Locky malware emails features a new development, whereby the Windows executable is now embedded in Javascript. Learn more from Cyren.

Corporate Crime and Hospital Hacks - Locky Shuts Down Businesses

Security Research & Analysis Web Security

Viral pandemics are certainly cause for a hospital to declare a “state of emergency.” But in the case of Methodist Hospital in Kentucky, the virus that caused the “internal state of emergency” didn’t relate to hundreds of patient-filled stretchers...

In this instance, Locky had infected the hospital’s entire computer system, forcing the hospital to pay four bitcoins (approximately $1,600) to obtain the decryption key!

Cyren's May 2016 Cyberthreat Report - Overview

by Lior Kohavi

Cyberthreat Report Security Research & Analysis

Cybercriminals are stealthy, smart, and sophisticated, building globally organized and highly-adaptive syndicates that quickly generate millions of dollars.

Virus Bulletin: Keeping Up with the Stegoloader Trojan

by John Callon

Malware Security Research & Analysis Threat Analysis

As CYREN’s GlobalView security cloud churns through billions of pieces of information every day, our researchers are busy examining how certain threats work in order to make the whole automated system continuously smarter.

Certain threats we find represent marked “advances" in intrusion techniques. A deep dive on the mechanics of one notable recent “advance" was published today by Virus Bulletin. Lordian Mosuela, one of our anti-malware experts, walks through a new development in the notorious history of the Stegoloader trojan, which was initially detected by CYREN last year as W32/Gatak and is used principally as a distribution vehicle for malware which steals sensitive information or installs the scourge of the moment, ransomware.