Cyren Security Blog

10 Cyber Threat Terms Every IT Manager Should Know

by John Callon

Do you know the difference between spear phishing and clone phishing and...just plain phishing? Or adware and malvertising? Check out the list below of the top 10 threat terms every employee should be familiar with, and familiarize yourself with more threat terms in Cyren’s new online Cyber Threat Dictionary in the Cyren Security Center.

Black Friday/Cyber Monday Alert: 5 Shopping Scams That Could Seriously Affect Your Business

by John Callon

The last thing any company needs during the holiday season is the gift of ransomware on its IT systems. During this week’s build-up to Black Friday, Cyber Monday, and the actual holidays in and around them (remember those?), everyone is going to spend some time doing a little shopping while on a company device or network, especially if it means scoring a bargain. 

How Do You Know Your Email Security Is Working?

by Duncan Mills

When was the last time you assessed the effectiveness of your email security infrastructure? Email is the main vehicle for introducing malware into an organization, so it is imperative that you do so — but it is difficult, so lots of people don’t. Here at Cyren we know how eye-opening such an evaluation can be, because during September and October, an average 10.5% of email reaching users protected by a number of email security products was spam or contained a threat. 

Fake Invoice Carries “Rescoms” Malware

by Maharlito Aquino and Kervin Alintanahin

Emails containing malicious attachments equipped with keyloggers and screen capture capabilities are targeting businesses worldwide, with noted attacks in Asia, Russia, and the Middle East. The campaign is designed to look like it comes from real affiliates and employees working for a well-known pharmaceutical distributor in order to make the emails more convincing and lure the recipients into opening the attached document.

Stealing Tax Refunds Soaring Worldwide

by Maharlito Aquino and Kervin Alintanahin

There appear to be only two things that are certain in life: death and cybercriminals trying to steal your tax refund.

As governments have moved tax systems online to facilitate life for the taxpayer, refund scams using phishing and social engineering to obtain personal financial information have become epidemic, with criminals diverting any tax refund due or even gaining access to personal bank accounts to steal funds directly. This week's case study is from Malaysia.

Locky Revived – A Roundup of New Variants

by Magni Reynir Sigurðsson

Locky, the ransomware which dominated 2016 and then disappeared for the first half of 2017, has been completely rescuscitated during the past three months with a series of new variants, and demanding three times the ransom rate. A possible reason for its disappearance and reemergence was explored in a recent SecurityWeek blog by Cyren's VP of Threat Research, Siggi Stefnisson.