www.cyren.com Open in urlscan Pro
2606:4700:3035::ac43:d797  Public Scan

Submitted URL: http://blog.cyren.com/articles/fake-bacs-remittance-emails-delivers-dridex-malware.html
Effective URL: https://www.cyren.com/blog/
Submission: On May 26 via api from IT — Scanned from IT

Form analysis 0 forms found in the DOM

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website and provide more personalized services to you, both on this website
and through other media. To find out more about the cookies we use, see our
Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline
 * Support
 * Login
   * CYREN INBOX SECURITY LOGIN
   * CYREN CLOUD SECURITY LOGIN
   * MYELEVEN LOGIN

 * Data443 & Cyren
 * Products
   * * * Products
       
       * FOR OEMS
       
       * Malware Detection
       * Malware Analysis
       * URL Categorization
       * Email Security
       * Threat Intelligence
       
       * FOR ENTERPRISES
       
       * Malware Analysis
       * Inbox Security for Office 365
       * Threat Intelligence
     
     * * IN THE NEWS
         
         Online Businesses Become a Phisher’s Playground
         Not nearly enough businesses have deployed sufficient security measures
         against phishing attacks through website builders and CMS
         platforms.Read Article on DarkReading >
         
         Go to Newsroom >
 * Solutions
   * * * Solutions
       * Anti-Phishing Solutions
       * Account Takeover Protection
       * Business Email Compromise Protection
       * Ransomware Protection
     
     * * EXPERT SUPPORT
         
         Cyren’s dedicated security analysts have the expertise to deeply
         investigate sophisticated threats – their embedded documents and messy
         code.
         
         And from their vantage point across companies, geographies, and
         industries, analysts can track emerging attack vectors and prevent
         breaches.
         
         “For any false positive or user reported items, we do not need to be
         involved. Cyren’s dedicated team is on top of all these items.”
         
         via Gartner Peer Insights
 * Resources
   * * * Resources
       * Webinars & Events
       * Research & Reports
       * Case Studies
       * Product Datasheets
       * Blog
     
     * * RECENT POSTS
         
         * Analyzing behavior to protect against BEC attacks December 22, 2022
         * Using NLP techniques to protect against BEC attacks December 8, 2022
         * Phishing with QR codes December 1, 2022
 * Company
   
   * * * COMPANY
       
       * About Cyren
       * Careers
       * Management
       * In the News
       * Contact Us
     
     * * IN THE NEWS
         
         Online Businesses Become a Phisher’s Playground
         Not nearly enough businesses have deployed sufficient security measures
         against phishing attacks through website builders and CMS
         platforms.Read Article on DarkReading >
         
         Go to Newsroom >
 * GET A DEMO

Select Page


CYREN SECURITY BLOG

The Cyren Security Blog is where Cyren engineers and thought leaders provide
insights, research and analysis on a range of current cybersecurity topics.


FEATURED POST


WHAT IS MICROSOFT OFFICE 365 ADVANCED THREAT PROTECTION?

Sep 12, 2022 | Office 365

Office 365 Advanced Threat Protection (also known as ATP and Defender) can
provide your organization with advanced security features - keeping you
protected from cybersecurity threats. With today's cybersecurity landscape,
where new...

read more

CATEGORIES

 * Business Email Compromise
 * Continuous Remediation
 * Incident Response
 * Malware
 * Office 365
 * Phishing
 * Security Awareness
 * Security Research & Analysis


LATEST POSTS


ANALYZING BEHAVIOR TO PROTECT AGAINST BEC ATTACKS

Business Email Compromise

Understanding “normal” behaviors in email exchanges are key to combating
advanced phishing and BEC attacks by John Stevenson Detecting Business Email
Compromise (BEC) In the final part of our series of blogs on Business Email
Compromise (BEC), it’s time to look at how...


ABUSING REMOTE ADMINISTRATION TOOLS

Malware, Security Research & Analysis

The bad, worse and the horrible by Gunnar Guðmundsson and Axel Marinho
Guðmundsson Introduction In this article, we look at a malware payload from an
exploited Microsoft Word document. With a little Python scripting and
deciphering we research a single sample and...


WHAT IS MICROSOFT OFFICE 365 ADVANCED THREAT PROTECTION?

Office 365

Office 365 Advanced Threat Protection (also known as ATP and Defender) can
provide your organization with advanced security features - keeping you
protected from cybersecurity threats. With today's cybersecurity landscape,
where new threats appear daily, if not...


USING NLP TECHNIQUES TO PROTECT AGAINST BEC ATTACKS

Business Email Compromise, Office 365, Phishing

How Natural Language Programming help combat phishing and BEC attacks by John
Stevenson Business Email Compromise (BEC) Business Email Compromise (BEC) covers
a range of email attacks that typically share a common core attribute. There is
no obvious executable...


ANALYZING MESSAGE METADATA TO PROTECT AGAINST BEC ATTACKS

Security Research & Analysis

Can analyzing message metadata help to protect organizations from becoming the
victim of a successful BEC attack? Business Email Compromise (BEC) is an
umbrella term spanning many forms of social engineering email attacks that
typically share the common characteristic...


THE HIDDEN COSTS OF PHISHING & BEC

Security Research & Analysis

By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO
director at Fluid Networks to discuss how they dramatically reduced the time
their security analysts spent managing the problem of phishing, BEC, and user
education. Here were some of the...


PHISHING WITH QR CODES

Phishing, Security Research & Analysis

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To
In 1994, a type of the matrix barcode known as the Quick Response code, now
widely known as QR code, was invented by Masahiro Hara from a Japanese company
Denso Wave. The purpose of the...


USING AI TO PROTECT AGAINST BEC ATTACKS

Business Email Compromise, Office 365

With no payload to detect, how best can organizations protect themselves from
Business Email Compromise and other social engineering attacks? by John
Stevenson Sometimes the simplest frauds are the most successful. Some years ago,
local authorities in the UK were...


3 WAYS TO OPTIMIZE YOUR SECURITY AWARENESS TRAINING PROGRAM

Security Awareness

By Mike Fleck Despite investments of time and money in secure email gateways,
phishing threats continue to be delivered to the user's inbox. To close this gap
in automated detection, many organizations roll out user security awareness
programs to train their employees...

« Older Entries



CYREN PROTECTS 1.3 BILLION USERS AGAINST EMERGING THREATS.  



CYREN IS NOW PART OF THE DATA443 FAMILY.


CONTACT

americas-sales@cyren.com
emea-sales@cyren.com
apac-sales@cyren.com

 * Data443 & Cyren
 * Company
 * Partners
 * Contact Us
 * Terms of Use
 * Privacy Policy
 * Cookie Policy

 * Data443 & Cyren
 * Company
 * Partners
 * Contact Us
 * Terms of Use
 * Privacy Policy
 * Cookie Policy

© Data443 & Cyren 2023. All trade/service marks or names referenced on this site
belong to their respective owners. The information contained herein is subject
to change without notice.





PRIVACY PREFERENCE CENTER




YOUR PRIVACY


YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.

More information about our cookies


 * STRICTLY NECESSARY COOKIES
   
   
   STRICTLY NECESSARY COOKIES
   
   Always Active
   Strictly Necessary Cookies
   
   These cookies are necessary for the website to function and cannot be
   switched off in our systems. They are usually only set in response to actions
   made by you which amount to a request for services, such as setting your
   privacy preferences, logging in or filling in forms.    You can set your
   browser to block or alert you about these cookies, but some parts of the site
   will not then work. These cookies do not store any personally identifiable
   information.
   
   Cookies Details‎


 * PERFORMANCE COOKIES
   
   
   PERFORMANCE COOKIES
   
   Performance Cookies
   
   These cookies allow us to count visits and traffic sources so we can measure
   and improve the performance of our site. They help us to know which pages are
   the most and least popular and see how visitors move around the site.    All
   information these cookies collect is aggregated and therefore anonymous. If
   you do not allow these cookies we will not know when you have visited our
   site, and will not be able to monitor its performance.
   
   Cookies Details‎


 * TARGETING COOKIES
   
   
   TARGETING COOKIES
   
   Targeting Cookies
   
   These cookies may be set through our site by our advertising partners. They
   may be used by those companies to build a profile of your interests and show
   you relevant adverts on other sites.    They do not store directly personal
   information, but are based on uniquely identifying your browser and internet
   device. If you do not allow these cookies, you will experience less targeted
   advertising.
   
   Cookies Details‎

Back Button


ADVERTISING COOKIES

Filter Button
Consent Leg.Interest
Select All Vendors
Select All Vendors
Select All Hosts

Select All

 * REPLACE-WITH-DYANMIC-HOST-ID
   
   
   33ACROSS
   
   33ACROSS
   
   View Third Party Cookies
   
    * Name
      cookie name

 * REPLACE-WITH-DYANMIC-VENDOR-ID
   
   
   33ACROSS
   
   3 Purposes
   
   View Privacy Notice
   
   
   
   33ACROSS
   
   3 Purposes
   
   View Privacy Notice
   
   REPLACE-WITH-DYANMIC-VENDOR-ID
   
   Consent Purposes
   
   Location Based Ads
   
   Consent Allowed
   
   Legitimate Interest Purposes
   
   Personalize
   
   Require Opt-Out
   
   Special Purposes
   
   Location Based Ads
   
   Features
   
   Location Based Ads
   
   Special Features
   
   Location Based Ads



Clear Filters

Information storage and access
Apply
Confirm My Choices Allow All



ON CYREN.COM WE USE COOKIES TO IMPROVE YOUR USER EXPERIENCE.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy

Accept All Cookies
Cookies Settings