CYREN Security Blog




New Threat Report: Everything you need to know about botnets

by John Callon

Filed under Anti-Malware, Cyberthreat Report, Malware Analysis, Web Security.

Cyren announces the release of the comprehensive cybersecurity report Botnets: The Clone Army of Cybercrime. This detailed look at a fundamental component of cybercrime infrastructure covers a wide range of botnet-specific topics, ranging from the basics of botnet architecture to in-depth analyses of botnet creation and evasion techniques.


Yuletide spam and shopping scams breaking records

by John Callon

Filed under Antispam, Email Security, Security Research & Analysis, Spam.

Global email traffic passing through Cyren’s cloud security operations is unfortunately reinforcing Scrooge’s initial view of Christmas, showing that Christmas-themed email is almost entirely commercial or criminal.

On Demand Webinar - Botnets: the Clone Armies of Cybercrime

by Elizabeth Daniels

Last week we hosted a webinar titled "Botnets: The Clone Armies of Cybercrime." Cyren security researchers, Avi Turiel and Geffen Tzur, discussed the history and current state of botnets and shared insights on malicious bot behavior, how to spot it, and what you can do to protect your organization. 

Malicious Google Chrome extension spreads nude celebrity pdf's to Facebook

by Magni Reynir Sigurðsson

Filed under Malware Analysis, Web Security.

A researcher at Cyren has found that a malicious Google Chrome extension is spreading nude celebrity PDFs to Facebook groups. A user is uploading a PDF document to groups with the name:


Why your email isn't as secure as you think it is

by Dan Maier

Filed under Anti-Malware, Phishing, Ransomware.

Recent headlines are chock-full of reports of email phishing attacks by cybercriminals who outwit employees to obtain sensitive personal data and financial information. Under the guise of recognized web payment and productivity tool requests, hackers lure potential victims into clicking on fake email links that are designed to steal credentials or download ransomware.