november review of cyren security blog

8
1 1 ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Always Ahead of the Threat ... with CYREN Security Blog

Upload: cyren

Post on 12-Jul-2015

77 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: November review of CYREN Security Blog

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Always Ahead of the Threat

... with CYREN Security Blog

Page 2: November review of CYREN Security Blog

2222

November Highlights

• Significant malware attacks and botnet expansion noted by CYREN

• Results from Q3 Internet Threats Trend Report released

• Growing threat of phishing attacks

• State of corporate security

Page 3: November review of CYREN Security Blog

33

Analyzing a significant malware attack

“The malware is a Trojan downloader, capable of retrieving and installing a range of other malware once it has been activated by users who open the .doc file. While MSWord usually warns users who try to open files with macros, most users will likely accept the warning and proceed to allow the macros to run.”

Page 4: November review of CYREN Security Blog

44

Q3 Trend Report released“From celebrity hacking to major corporate data breaches, the third quarter of 2014 demonstrated the lengths cybercriminals will go in order to obtain sensitive and private information. In early September, the world learned of a major breach to celebrity Apple iCloud accounts, likely achieved either through highly targeted phishing or using research techniques similar to those honed by “Hollywood Hacker” Chris Chaney.

Page 5: November review of CYREN Security Blog

55

Growing threat of phishing attacks

“Email is a critical vector of phishing scams. By faking messages from well-known services, social networks or financial organizations, phishers are able to significantly improve the chances of their phishing being successful..“

Page 6: November review of CYREN Security Blog

66

Increase in malware distribution corresponds with decrease in spam

“Periodically throughout the year, CYREN analysts see these types of fluctuations. Reasons vary, although CYREN analysts suspect that botnet owners are “repurposing”, with the primary objective to expand the botnet; malware is increasing and the reduction in spam volume comes from the cybercriminal’s desire to expand and “groom” the botnet. "

Page 7: November review of CYREN Security Blog

77

The state of corporate security

“When you consider that an estimated 60% of all companies experiencing a cybersecurity breach go out of business within six months of the attack, it is a wonder that all corporations aren’t making cybersecurity a higher priority. Yet, the level of corporate complacency with regard to cybersecurity remains high. “

Page 8: November review of CYREN Security Blog

88

Visit the CYREN Security Blog for more details and watch out for upcoming articles on the latest trends in malware, spam and phishing

www.blog.CYREN.com