Cyren logo

Cyber Security Newsletter | August 2017

Malware threat report banner

The Malware Wars are Heating Up

In the 2017 Malware Cyber Threat Report, Cyren dives into today's viruses, spyware, and headline-stealing ransomware to help you feel like a malware expert. In the report, you will:

  • Understand the different types of malware
  • Hear from a security innovator who pioneered detecting threats
  • Gain insight into what's new and concerning

Get more detail at this blog and get up to speed on malware threats with Cyren’s free Malware Threat Report.

Phishing newsletter banner

Security Education – New Phishing-at-a-glance Resource Page

What is phishing -- and what isn’t? Our new “phishing-at-a-glance” resource page in the Cyren Security Center covers the phishing basics for any IT admin and adds some quick facts, along with links to relevant reports and on-demand webinars. 43% of IT managers say their company has been successfully phished in the past year, and one study indicated that 91% of data breaches start with a phish—don’t be next!

CHECK IT OUT homepage

Cyren In The News

Banking Technology - Trickbot is back, new and improved, and is targeting customers of Lloyds Bank in the UK in a new phishing...  READ MORE >
ZDNet - A notorious banking Trojan is targeting customers of a major bank with a new email spam campaign...  READ MORE >
Bleeping Computer - Malware activity has ramped up in the second quarter of 2017, according to reports from cyber-security firms Cyren...  READ MORE >

More Live And Virtual Events Hosted By Cyren

Webinar icon - red

Live Webinar

IT Security at SMBs: 2017 Benchmarking Survey

Thursday, September 14, 2017

Time Options:
2:00 EDT | 1:00 CDT | 11:00 PDT

Live webinar graphic


Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional (ENG)

Thursday, September 14, 2017

15:00 BST  | 16:00 CEST

Warum „on-premises“ Lösungen aktuellen Angriffen nicht standhalten (GER)

Tuesday, September 19, 2017

11:00 CEST

Event image

On-demand Webinar

Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks

Watch It Now >


Cyren Blog Posts You Might Have Missed

Zeus botnet article image
Build, buy, or lease? The 15-minute botnet

Becoming an Internet criminal is getting easier and easier. With only a few hundred dollars in hand and an Internet connection, anyone can obtain the software and support to build a botnet.


ET Botnet image
Legitimate Botnets Do Exist

Although the term ‘botnet’ is generally associated with cybercrime and maliciousness, it should come as no surprise that there are, in fact, fully legitimate and entirely useful botnets—better known as “distributed computing systems”—at work around the globe.


Detecting botnet image
Self defense: Detecting a bot inside your network

The ratio expressed in the saying “an ounce of prevention is worth a pound of cure” is off by several magnitudes when applied to Internet security.



How good is your web security?

WSD icons