Resource center

Live upcoming webinars

Currently there are no news items.

On-demand webinars

Security practices

January 25, 2018
Is Your Web Security Working? How to Test and Tune Your Web Security
More details
December 19, 2017
Email Security Gap Analysis: How Do You Know Your Security Is Working?
More details
November 16, 2017
Why Deploy Email Archiving in the Cloud?
More details
July 19, 2017
Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
More details
April 11, 2017
Confronting the Ransomware Crisis: Best Practices for Securing Your Business
More details
March 01, 2017
Is It Time to Move Your Security to the Cloud?
More details
January 18, 2017
Email Security: Why It Probably Isn’t Working, and What To Do
More details
October 04, 2016
10 Steps You Can Take To Protect Your Business From Phishing Attacks
More details
June 16, 2016
Stopping Evasive Malware: How A Cloud Sandbox Array Works
More details
April 20, 2016
Confronting The Ransomware Crisis: Best Practices For Securing Your Business
More details
February 17, 2016
Is Your Web Security Broken? 10 Things You Need To Know
More details

Understanding threats

April 05, 2018
The Top 5 Downsides and Dangers of Cryptocurrency Mining
More details
February 22, 2018
Reducing the Risk of Phishing Attacks
More details
July 11, 2017
How Changing Malware is Changing Security
More details
May 18, 2017
Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
More details
December 07, 2016
Botnets: The Clone Armies Of Cyber Crime
More details
November 15, 2016
How Hackers Are Making Your Security Obsolete With Hyper-Evasive Malware
More details
August 24, 2016
A Deep Dive On Phishing, Today's #1 Business Threat
More details
June 28, 2016
Why Evasive Zero-Day Attacks Are Killing Traditional Sandboxing
More details
May 17, 2016
A Deep Dive On Ransomware With The Cyren Security Team
More details

Industry surveys

September 14, 2017
IT Security at SMBs: 2017 Benchmarking Survey
More details
March 15, 2017
IT Security in the UK: 2017 Business Survey
More details
July 20, 2016
IT Security At SMBs: 2016 Benchmarking Survey
More details
March 23, 2016
Insights From Cyren's 2016 Cyber Threat Report
More details

Take the first step towards better security for your company

Web Security Diagnostic

Identify security gaps now with Cyren's free online web security test. In less than 30 seconds, you will know if you may be vulnerable to cyber threats – from malware to phishing attacks to botnets.

Test your web security
Email Security Gap Analysis report

Cyren examined 11.7 million inbound emails at companies using various email security solutions to measure any possible "security gaps" in their protection – download the aggregated report.

Recent blog posts

Have Email Threats Finally Worn Down IT Professionals? 80 Opinions on the State of Email Security

by Duncan Mills

Cyren recently gathered opinions from the Spiceworks IT community membership about the state of email security. We received almost 80 responses and were surprised at what appears to be a general feeling that the respondents are losing the battle against email threats. 

Beware the Ides of April: Tax Fraud Season in Full Gear

by John Callon

It’s tax season, and in the 21st century that means that not only are government revenue agents awaiting your data and looking to settle accounts, but that cybercriminals are hard at work with a variety of cyber scams aimed at diverting tax refunds and stealing sensitive personal information, such as social security numbers and birthdates.

725% increase in cryptocurrency mining threatens more than just your CPU

by Tinna Thuridur Sigurdardottir

We've been tracking cryptocurrency mining activity here at the Cyren Security Lab and have confirmed a massive run-up in the number of web sites hosting "cryptomining" scripts globally. Based on the monitoring of a sample of 500,000 sites, we've found a 725% increase in the number of domains running scripts on one or more pages -- knowingly or not -- in the four-month period from last September to January 2018.

WARNING: UK Tax Refund Phishing Scam Identified

by Maharlito Aquino and Kervin Alintanahin

A warning to individuals filing taxes in the United Kingdom: Cyren has identified a tax refund phishing email that, at first glance, appears to come from HM Revenue & Customs (HMRC), the UK’s tax, payments, and customs authority. The fraudulent email tries to trick the recipient into opening a PDF by suggesting that the victim’s tax refund information is now available for viewing. Once the email is opened, the victim is encouraged to click a link which redirects to a phishing site seeking the victim’s personal credentials. These phishing documents are detected and blocked by Cyren as PDF/Phishing1.CYO.

Cryptocurrency phishing attack nets over $1 million in a few hours

by Avi Turiel

With tremendous money to be made in a short period of time, phishing has become commonplace within the cryptocurrency exchange world, particularly at the moment when a new currency comes along and debuts with its initial coin offering (ICO), an event not unlike an initial public offering with corporate stock. Initial coin offerings are happening with frequency as there are now over 1,200 (and counting) cryptocurrencies out there. Phishers are exploiting the ICO frenzy by first hacking into these participant email databases and then sending phishing emails to ICO participants, with instructions to deposit funds into the phisher’s cryptocurrency account.

 

Business Email Compromise (Imposter) Attacks Are Not Going Away

by Duncan Mills

Business email compromise (BEC) attacks have been increasing in number over the last few years, driven by their relative success rate compared to other financially motivated attacks. They appear to be quite simple – the attacker sends an email to the intended victim, usually a member of the finance team, and requests that they transfer money to an account controlled by the attacker. But why would the victim do so? Well, the attacker has actually invested a fair amount of time and effort into crafting the attack. He uses various social engineering tactics to generate a sense of urgency. He has researched the target organisation, understands the chain of command and the email will appear to have been sent from a member of the leadership team, often the CEO, hence the alternative names for this type of attack – CEO fraud or imposter emails.