CYREN Security Blog

 

Articles

Categories

Analyzing an Outlook phishing attack

by Erwin Balunsat

Filed under Anti-Malware, Malware Analysis, Security Research & Analysis, Web Security.

It is in my routine to read emails before starting my daily work while enjoying my cup of coffee. While browsing for important emails I need to separate spam emails from legitimate emails and analyze the spam emails. I was trying to sort out the spam emails when I came across an odd email

Q1 Cyber Threats Report: Rapidly growing volume of Web security traffic reveals new threat trends

by Lior Kohavi

Filed under Security Research & Analysis, Web Security.

The regular cadence of high-profile security breaches that we saw during 2014 continued into 2015, with health insurance giant Anthem providing the latest entry in a growing list of major corporate victims. We will not review the Anthem breach in this report as it has already been covered extensively in many other places, but CYREN does believe that this attack is important because it represents a shift in targeting by cyber criminals. 

New Macro Malware Uses Fake Google Enterprise Support Email

by Lordian Mosuela

Filed under Anti-Malware, Malware Analysis, Security Research & Analysis.

In the past months of analyzing malware samples, macro malware has been on the rise.  Last week, we received a fake email of Google Enterprise Support with an attachment file "Info I44185821.zip-> Wire_info_60255.doc". 

Prediction: I’ll never pay for identity theft protection again – and that’s not a good thing.

by Daisy Spiridopoulos

Filed under Miscellaneous, Web Security.

I received my third letter in as many years this morning from a business telling me that their network was breached and my personal information compromised. In this case, the business was Anthem, and I’m queasier about this one since the list of information possibly taken is the longest yet: names, dates of birth, Social Security numbers, health care ID numbers, home addresses, email address and employment information - including income data. 

AN ASSESSMENT OF INDUSTRIAL IOT THREATS IN 2015 AND BEYOND

by Avi Turiel

Filed under Miscellaneous, Security Research & Analysis, Web Security.

The Internet of Things (IoT) is hot. From light bulbs to refrigerators to smart TVs, companies are under tremendous pressure to get new IoT devices to market and consumers are instantly snapping them up. In fact, the number of devices that are or will shortly be connected to the Internet is rising rapidly. According to Gartner, by 2020 there will be more than 26 billion IoT devices in operation.