always ahead of the threat .. with cyren security blog in september

8
© 2014 CYREN Confidential and Proprietary 1 Monday, June 20, 2022 © 2014 CYREN Confidential and Proprietary ALWAYS AHEAD OF THE THREAT... ...WITH CYREN BLOG

Upload: cyren

Post on 24-Apr-2015

42 views

Category:

Technology


0 download

DESCRIPTION

Stay ahead of trending internet threats with CYREN Security blog. Take a quick peek at what was trending in September 2014 and visit our blog for more detailed information: www.blog.CYREN.com

TRANSCRIPT

Page 1: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 1April 11, 2023 © 2014 CYREN Confidential and Proprietary

ALWAYS AHEAD OF THE THREAT...

...WITH CYREN BLOG

Page 2: Always Ahead of the Threat .. with CYREN Security Blog in September

2© 2014 CYREN Confidential and Proprietary 2

CYREN SECURITY BLOG NAMED AMONG 40 INFORMATION SECURITY BLOGS YOU SHOULD BE

READING

BY SECURITY INNOVATION EUROPE

Page 3: Always Ahead of the Threat .. with CYREN Security Blog in September

3© 2014 CYREN Confidential and Proprietary 3

SEPTEMBER SAW ICLOUD GETTING COMPROMISED, SIMPLE YET DANGEROUS MALWARE WRITTEN BY

HOUDINI AND EXPLOITS OF WORDPRESS VULNERABILITIES

ALSO INTRODUCING CONCEPT OF LAYERED SECURITY

Page 4: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 4

HACKER POSTS PHOTOS OF CELEBRITIES IN THEIR BIRTHDAY SUITS

“The personal iCloud accounts of at least 100 celebrities were compromised and personally “revealing” images stolen off them and posted online in September. The question most people are asking (CYREN included) is “How did this happen?” A targeted phishing attack is certainly a possibility, as evidenced by this phishing image, which appears to come from Apple and asks the victim to verify his/her email address.”

Page 5: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 5

DUAL DETECTION ENGINES—USING LAYERED SECURITY TO BATTLE CYBERCRIME

“While a good single engine can provide up to 98% threat detection, the fact of the matter is, no engine is ever going to provide 100% security. We began to wonder how close to 100% security can you get and what it would take to get there.”

Page 6: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 6

FINDING DUNIHI BY HOUDINI

“Dunihi is a RAT (Remote Access Tool) written in VBS (Visual Basic Script) that provides backdoor access to the infected system. We detect this as VBS/Dunihi. It may have arrived via infected USB drive, attachment in spammed email or malicious link / hack website. ”

Page 7: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 7

HACKERS EXPLOITING WORDPRESS VULNERABILITIES

“Increasingly cybercriminals are looking for any avenue possible to conduct an attack, and vulnerabilities in WordPress offer that path or “threat vector” to hackers wishing to gain access to a computer or network in order to deliver malicious content.”

Page 8: Always Ahead of the Threat .. with CYREN Security Blog in September

© 2014 CYREN Confidential and Proprietary 8

Visit the CYREN Security blog for more details and watch out for upcoming

articles on latest trends in malware, web security and more

www.blog.CYREN.com