www.cyren.com
Open in
urlscan Pro
2606:4700:10::ac43:57b
Public Scan
Submitted URL: http://blog.cyren.com/articles/fake-bacs-remittance-emails-delivers-dridex-malware.html
Effective URL: https://www.cyren.com/blog/
Submission: On October 10 via api from DE — Scanned from DE
Effective URL: https://www.cyren.com/blog/
Submission: On October 10 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Partners * Support * Login * CYREN INBOX SECURITY LOGIN * CYREN CLOUD SECURITY LOGIN * MYELEVEN LOGIN * PARTNER LOGIN * Products * * * Products * Inbox Security for Office 365 * Threat InDepth * Incident Response Service * APIS AND SDKS * Malware Detection & Analysis Engines * URL Categorization Engine * URL Lookup API * Email Security Engine * Threat Intelligence * * IN THE NEWS Online Businesses Become a Phisher’s Playground Not nearly enough businesses have deployed sufficient security measures against phishing attacks through website builders and CMS platforms.Read Article on DarkReading > Go to Newsroom > * Solutions * * * Solutions * Anti-Phishing Solutions * Account Takover Protection * Business Email Compromise Protection * Ransomware Protection * * EXPERT SUPPORT Cyren’s dedicated security analysts have the expertise to deeply investigate sophisticated threats – their embedded documents and messy code. And from their vantage point across companies, geographies, and industries, analysts can track emerging attack vectors and prevent breaches. “For any false positive or user reported items, we do not need to be involved. Cyren’s dedicated team is on top of all these items.” via Gartner Peer Insights * Resources * * * Resources * Webinars & Events * Research & Reports * Case Studies * Product Datasheets * Blog * * RECENT POSTS * What is Microsoft Office 365 Advanced Threat Protection? September 12, 2022 * The Hidden Costs of Phishing & BEC August 25, 2022 * 3 Ways to Optimize Your Security Awareness Training Program August 23, 2022 * Company * * * COMPANY * About Cyren * Careers * Management * Investor Relations * Press Releases * In the News * Contact Us * * IN THE NEWS Online Businesses Become a Phisher’s Playground Not nearly enough businesses have deployed sufficient security measures against phishing attacks through website builders and CMS platforms.Read Article on DarkReading > Go to Newsroom > * GET A DEMO Select Page CYREN SECURITY BLOG The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics. FEATURED POST HOW THE WAR IN UKRAINE HAS INFLUENCED THE SCAMMERS’ UNDERGROUND Jun 16, 2022 | Phishing, Security Research & Analysis by Ira Chernous For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start of the Russian invasion of Ukraine, the international community has... read more CATEGORIES * Business Email Compromise * Continuous Remediation * Incident Response * Malware * Office 365 * Phishing * Security Awareness * Security Research & Analysis LATEST POSTS WHAT IS MICROSOFT OFFICE 365 ADVANCED THREAT PROTECTION? Office 365 Office 365 Advanced Threat Protection (also known as ATP and Defender) can provide your organization with advanced security features - keeping you protected from cybersecurity threats. With today's cybersecurity landscape, where new threats appear daily, if not... PROTECT OFFICE 365 EMAIL FROM RANSOMWARE Office 365 Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage costs of $20 billion. While there is no ransomware that specifically targets Office 365 data, it can... HOW THE WAR IN UKRAINE HAS INFLUENCED THE SCAMMERS’ UNDERGROUND Phishing, Security Research & Analysis by Ira Chernous For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start of the Russian invasion of Ukraine, the international community has been helping the victims by... THE HIDDEN COSTS OF PHISHING & BEC Security Research & Analysis By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO director at Fluid Networks to discuss how they dramatically reduced the time their security analysts spent managing the problem of phishing, BEC, and user education. Here were some of the... EMAIL HIJACKING DELIVERS QAKBOT MALWARE Malware, Security Research & Analysis by Dexter To and Maharlito Aquino Introduction Originally a banking Trojan that existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware as a service, which is continually maintained and developed to this day. While its main purpose is to steal... THE RESURGENCE OF EMOTET Malware, Security Research & Analysis by Kervin Alintanahim Password Protected Docs One of the most recent Emotet samples we received were emails with password protected attachments. Although the malicious document needs an extra step to be accessed compared to just being attached as it is, the additional... 3 WAYS TO OPTIMIZE YOUR SECURITY AWARENESS TRAINING PROGRAM Security Awareness By Mike Fleck Despite investments of time and money in secure email gateways, phishing threats continue to be delivered to the user's inbox. To close this gap in automated detection, many organizations roll out user security awareness programs to train their employees... EXAMPLE ANALYSIS OF MULTI-COMPONENT MALWARE Malware, Security Research & Analysis by Kervin Alintanahin Recently, we have received an increase in the number of malicious email samples with password-protected attachments. The recent waves of attacks with Emotet use a similar approach. In this blog we describe our analysis of another set of samples... MALICIOUS EXCEL ADD-IN VARIANT DELIVERS MALWARE Malware, Security Research & Analysis By Floser Bacurio Jr XLL is an Excel Add-in extension file that provides ways to use third-party tools and functions that are not available in Microsoft Excel. It is typically a Dynamic Link Library (DLL) file that can be loaded by Microsoft Excel provided the file... « Older Entries CYREN PROTECTS 1.3 BILLION USERS AGAINST EMERGING THREATS CONTACT americas-sales@cyren.com emea-sales@cyren.com apac-sales@cyren.com * Company * Partners * Careers * Investor Relations * Contact Us * Terms of Use * Privacy Policy * Cookie Policy * Company * Partners * Careers * Investor Relations * Contact Us * Terms of Use * Privacy Policy * Cookie Policy © Cyren 2022. All trade/service marks or names referenced on this site belong to their respective owners. The information contained herein is subject to change without notice. PRIVACY PREFERENCE CENTER YOUR PRIVACY YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information about our cookies * STRICTLY NECESSARY COOKIES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details * PERFORMANCE COOKIES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details * TARGETING COOKIES TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID 33ACROSS 33ACROSS View Third Party Cookies * Name cookie name * REPLACE-WITH-DYANMIC-VENDOR-ID 33ACROSS 3 Purposes View Privacy Notice 33ACROSS 3 Purposes View Privacy Notice REPLACE-WITH-DYANMIC-VENDOR-ID Consent Purposes Location Based Ads Consent Allowed Legitimate Interest Purposes Personalize Require Opt-Out Special Purposes Location Based Ads Features Location Based Ads Special Features Location Based Ads Clear Filters Information storage and access Apply Confirm My Choices Allow All ON CYREN.COM WE USE COOKIES TO IMPROVE YOUR USER EXPERIENCE. By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Accept All Cookies Cookies Settings