CYREN Security Blog




CYREN Member of Internet Watch Foundation

by Simone Leyendecker

Filed under Security Research & Analysis, Web Security.

Effectively today, CYREN is an official  Member of the Internet Watch Foundation (IWF), the UK internet Hotline for anyone to report their exposure to online child sexual abuse imagery hosted anywhere in the world, non-photographic child sexual abuse images and criminally obscene adult content hosted in the UK. The IWF works in partnership with the online industry, government, police and the public.

You Got Crypto Mail

by Maharlito Aquino

Filed under Antispam, Email Security, Malware Analysis, Security Research & Analysis.

In a spam campaign that we have been seeing at the end of the year, malware actors were sending out Courier Delivery Notification themed e-mails to lure users into falling prey to the infamous CryptoWall ransomware...


ENCORE: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas again!

by Simone Leyendecker

Filed under Antispam, Email Security, Security Research & Analysis.

You might remember CYREN’s previous Cyber-Grinch and Cyber-Scrooge blog article from 2014. Tis the time of the year when this article’s content becomes relevant again!

In 2015, the cyber-criminals, alias Cyber-Grinch and Cyber-Scrooge are active and creative in their goal of making money - again. Find out more about "The Scams of Christmas Past, Present, and Future"...

Sandbox Array and APT in Asia Pacific

by Sylvain Lejeune

Filed under malware, Miscellaneous, Web Security.

While publically disclosed data breaches this year have increased, the majority are not reported, and many go undetected.  Whilst some of these organizations were unprepared or slow to respond, many others have adopted a layered approach to prevent cyber security breaches as well as to mitigate the situation should a breach occur. 

As attacks are increasingly targeted, sophisticated, and evasive, many enterprise and government agencies are combining multiple engines, tools, feeds, and technologies each of which brings different detection benefits, to enhance threat detection capabilities with the objective being to significantly reduce the risk of cybercrime.

Hidden Malware and the Ghosts of Mobile Technology

by Avi Turiel

Filed under Anti-Malware, Malware Analysis, Mobile Security.

Already discovered packaged into 39 different Android apps, “Ghost Push” (sometimes also called “Rootnik”) malware turns an infected device into a platform for the installation of adware, unwanted homescreen links, and further malware. Victims have found the malware to be deeply entrenched and difficult to remove.