SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
1	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  This	
  document	
  and	
  the	
  contents	
  therein	
  are	
  the	
  sole	
  property	
  of	
  CYREN	
  and	
  may	
  not	
  be	
  transmiHed	
  or	
  reproduced	
  without	
  CYREN’s	
  express	
  wriHen	
  permission.	
  
CYREN	
  2016	
  Cyberthreat	
  Report	
  
Lior	
  Kohavi	
  —	
  CTO	
  
Avi	
  Turiel	
  —	
  Director	
  of	
  Threat	
  Research	
  
John	
  Callon	
  —	
  Sr.	
  Director,	
  Product	
  Marke@ng	
  
2	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
§  In	
  2016:	
  Detec@on	
  is	
  not	
  the	
  new	
  preven@on	
  
§  Sandbox-­‐aware	
  malware	
  
§  Demo	
  of	
  automated	
  analysis	
  	
  
•  Big	
  data	
  and	
  threat	
  detec@on	
  
•  Malware	
  success	
  indicates	
  future	
  trends	
  
•  Incremental	
  aHack	
  improvements	
  
•  Yearly	
  trends	
  	
  	
  
Agenda	
  
3	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Detec:on	
  
•  Based	
  on	
  a	
  false	
  percep@on	
  that	
  sophis@cated	
  aHacks	
  are	
  too	
  difficult	
  
to	
  prevent	
  
•  Detec@ng	
  breaches	
  a[er	
  the	
  fact	
  is	
  all	
  that	
  can	
  be	
  done	
  
	
  
Preven:on	
  
•  Complete	
  automa@on	
  of	
  the	
  detec@on	
  framework	
  
•  Includes	
  advanced	
  analysis	
  of	
  poten@al	
  threats	
  to	
  improve	
  preven@on	
  
In	
  2016,	
  Detec:on	
  is	
  not	
  the	
  new	
  preven:on	
  
4	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
More	
  and	
  more	
  malware	
  will	
  learn	
  and	
  become	
  ‘aware’	
  
of	
  specific	
  sandboxes,	
  preven@ng	
  “detona@on”	
  of	
  the	
  
malware	
  and	
  subsequent	
  detec@on.	
  Cloud-­‐based	
  mul@-­‐
sandbox	
  arrays	
  will	
  prevent	
  this,	
  since	
  the	
  malware	
  
can’t	
  recognize	
  every	
  possible	
  environment.	
  
Predic:on:	
  Prolifera:on	
  of	
  sandbox-­‐aware	
  malware	
  
5	
  
Sandbox-­‐aware	
  malware	
  
Challenges:	
  
§  Malware	
  detects	
  OS	
  features	
  
§  Detects	
  virtualiza@on	
  &	
  debug	
  tools	
  
§  Runs	
  only	
  when	
  specific	
  files/registry	
  keys	
  are	
  found	
  
§  Runs	
  only	
  on	
  32/64	
  bit,	
  Windows	
  7/8/10	
  or	
  XP	
  
§  Malware	
  detects	
  environment	
  condi@ons	
  
§  Runs	
  only	
  in	
  specific	
  Domain	
  names	
  
§  Runs	
  only	
  when	
  specific	
  systems	
  are	
  found	
  in	
  network	
  
§  Detects	
  proxy	
  sehngs	
  
§  Time	
  aware	
  malware	
  
§  Runs	
  only	
  in	
  specific	
  @mes	
  of	
  the	
  day/week/month	
  
§  Runs	
  only	
  in	
  specific	
  intervals	
  
§  Runs	
  only	
  in	
  specific	
  @me	
  zones	
  
§  Requires	
  long	
  run@me	
  –	
  hours,	
  even	
  days	
  
§  Geo-­‐loca@on	
  aware	
  malware	
  
§  Runs	
  only	
  in	
  specific	
  regions/countries	
  
§  Communica@on	
  
§  Malware	
  uses	
  TLS/SSL	
  to	
  call	
  home	
  
§  C&C	
  server	
  unavailable	
  due	
  to	
  many	
  reasons	
  
6	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
CYREN	
  Advanced	
  Malware	
  Analysis	
  
Arbitrator	
  
Sandbox	
  
A	
  	
  
Sandbox	
  
B	
  
IDS	
  
External	
  	
  
Feeds	
  
Reputa@on	
  
Mobile	
  
Sandbox	
  
Sandbox	
  
Less	
  
OS	
  Heuris@cs	
   Network	
  Heuris@cs	
  
Conclusions	
  
	
  (RSS)	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  API	
  	
  (Raw	
  Data)	
  	
  	
  	
  	
  	
  	
  	
  	
  Repor@ng	
  
URLs,	
  Malware	
  samples,	
  Emails	
  for	
  Analysis	
  
7	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
•  Show	
  automated	
  analysis	
  process	
  
Live	
  malware	
  analysis	
  
8	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
•  “Audible	
  message”	
  email	
  aHachment	
  
•  Bayrob,	
  Nivdort,	
  or	
  Symmi	
  
•  Password	
  stealer,	
  bitcoin	
  miner	
  
•  Uses	
  memory	
  dumping	
  to	
  prevent	
  
analysis	
  
•  Domain	
  genera@on	
  algorithm	
  (DGA)	
  
u  “simpleques@on.net”	
  
u  “mountainmeasure.net”	
  
u  “winteranger.net”	
  
u  “subjectafraid.net”	
  
•  Evaded	
  one	
  sandbox,	
  detonated	
  in	
  the	
  
second	
  sandbox	
  allowing	
  detec@on	
  
“WhatsApp”	
  audible	
  message	
  aPack	
  
9	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Large	
  data	
  analysis	
  will	
  help	
  flag	
  poten@ally	
  dangerous	
  
URLs,	
  IP	
  addresses,	
  and	
  malware	
  objects	
  before	
  
employees	
  fall	
  vic@m	
  to	
  these	
  threats.	
  
Predic:on:	
  Big	
  Data	
  Analysis	
  will	
  find	
  threats	
  
10	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
•  Large	
  data	
  sources	
  used	
  to	
  stop	
  known	
  or	
  large	
  threats	
  
•  Also	
  find	
  hints	
  of	
  lesser-­‐known	
  threats	
  hidden	
  in	
  malicious	
  sources	
  
•  Example:	
  
•  CYREN	
  highlighted	
  suspicious	
  URLs	
  and	
  IP	
  addresses	
  being	
  accessed	
  by	
  
employees	
  at	
  a	
  company	
  that	
  uses	
  CYREN	
  WebSecurity	
  
•  invoice-­‐myups.org	
  
•  217.71.50.24	
  
•  URLs	
  and	
  IP	
  addresses	
  marked	
  as	
  suspicious	
  based	
  on	
  a	
  range	
  of	
  
factors	
  
Triggering	
  “Big	
  Data”	
  analysis	
  
11	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Reputa@on	
  Calcula@on	
  –	
  A	
  Synergy	
  of	
  Insights	
  
webfeed.so[update.org	
  
invoice-­‐myups.org	
  
terminal.vla-­‐engineering.com	
  
217.71.50.24	
  
178.132.203.166	
  
invoiceid-­‐[a-­‐
z0-­‐9]{20}.doc	
  
invoiceid-­‐[a-­‐
z0-­‐9]
{20}.pdf.zip	
  
spam	
  campaign	
  aHachments	
  
D20aeb6ccc9f9
c258ef158b47c
3f33613141f7af
ebfd7bd0e61b0
f76c7061f97	
  
5a6e6396d0573
9f08109c8f9e9e
8eacc2f395c220
1d560963cd39c
eb5c36d728	
  
Hash	
  value	
  
1e5dd90edb81
2ce1d741b6343
9c28cf2934693
e292c8b47fd06
519d7449d7c1c	
  
app.invoice-­‐myups.org	
  
Subdomain	
  of	
  
Zeus	
  
www-­‐myups.org	
  
okfnjcds@126.co	
  
Registrant	
  is	
  
no-­‐replays-­‐[0-­‐9a-­‐z]{6}@ups.invoice	
  
no@fica@ons-­‐[0-­‐9a-­‐z]{6}
@ups.invoice	
  
12	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Using	
  Big	
  Data	
  to	
  Predict	
  Malware	
  Trends	
  
13	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
§  40	
  to	
  50	
  million	
  emails	
  distributed	
  in	
  short	
  bursts	
  las@ng	
  only	
  three-­‐	
  
to	
  five-­‐minutes	
  each	
  
Map	
  the	
  APack	
  
14	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Malware	
  will	
  con@nue	
  to	
  be	
  distributed	
  via	
  email,	
  
macro	
  malware	
  is	
  here	
  to	
  stay,	
  con@nued	
  focus	
  on	
  POS	
  
systems,	
  regional	
  diversity	
  of	
  C&C	
  
Predic:on:	
  Malware	
  success	
  will	
  be	
  repeated	
  
15	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Gunpowder	
  
•  Distributed	
  via	
  SMS	
  messages	
  through	
  
the	
  phone’s	
  contact	
  list,	
  under	
  the	
  
message	
  “a	
  fun	
  game	
  ^_^.”	
  
•  Hidden	
  in	
  old	
  Nintendo	
  games	
  for	
  
Android	
  and	
  bundled	
  with	
  aggressive	
  
adware	
  
•  Informa@on	
  stealer	
  
•  Spreads	
  further	
  via	
  SMSs	
  
Notable	
  2015	
  Malware	
  -­‐	
  Android	
  
16	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Stegaloader/Gatak	
  
•  Steganography	
  Malware	
  
•  Malware	
  arrives	
  as	
  a	
  bundled	
  file	
  in	
  so[ware	
  
cracking	
  tools	
  
•  Malware	
  retrieves	
  the	
  image,	
  then	
  the	
  hidden	
  
encrypted	
  data	
  inside	
  via	
  a	
  steganography	
  
technique	
  
•  Encryp@on	
  used	
  for	
  communica@on	
  with	
  C&C	
  
Notable	
  2015	
  Malware	
  -­‐	
  Windows	
  
17	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Alina	
  	
  
•  Distribu@on	
  via	
  USB	
  but	
  also	
  emailed	
  macro	
  malware	
  
•  Targets	
  credit	
  card	
  swipe	
  systems	
  
•  Most	
  POS	
  systems	
  running	
  Windows	
  OS	
  encrypt	
  credit	
  card	
  data	
  
•  Data	
  is	
  briefly	
  available	
  unencrypted	
  in	
  the	
  system’s	
  memory	
  
•  Alina	
  uses	
  a	
  memory	
  scraping	
  technique	
  
•  Includes	
  features	
  such	
  as	
  screen	
  capture	
  and	
  keylogging	
  
•  MalumPoS	
  targets	
  POS	
  so[ware	
  developed	
  by	
  MICROS	
  (owned	
  by	
  
Oracle)	
  widely	
  used	
  by	
  hotels,	
  restaurants,	
  and	
  retailers	
  in	
  the	
  US	
  
Notable	
  2015	
  Malware	
  -­‐	
  POS	
  
18	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Malware	
  year	
  in	
  Review	
  
19	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Increasingly	
  cybercriminals	
  will	
  use	
  sophis:cated,	
  yet	
  
subtle,	
  incremental	
  changes	
  in	
  their	
  approach	
  to	
  
cybercrime.	
  
Predic:on:	
  Incremental	
  changes	
  to	
  threat	
  techniques	
  
20	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
•  Subtle,	
  yet	
  powerful	
  changes	
  to	
  
malware	
  and	
  spam	
  distribu@on	
  
methods	
  to	
  improve	
  the	
  overall	
  
success	
  of	
  threats	
  and	
  breach	
  
aHempts	
  
•  Example	
  –	
  “the	
  invoice	
  that	
  you	
  
requested”	
  
Incremental	
  Changes	
  
21	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
•  Harvest	
  legi@mate	
  email	
  headers	
  
from	
  compromised	
  email	
  accounts	
  
•  Creates	
  the	
  appearance	
  of	
  a	
  
legi@mately	
  redirected	
  newsleHer	
  
•  Designed	
  to	
  outwit	
  an@-­‐spam	
  
systems	
  
Advanced	
  fake	
  email	
  headers	
  	
  
22	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
§  Sophis@cated	
  social	
  engineering	
  
§  Demonstrates	
  extensive	
  tools	
  available	
  to	
  cybercriminals	
  
•  Using	
  aHack	
  vectors	
  that	
  are	
  ignored	
  	
  
Con:nued	
  use	
  of	
  macro	
  malware	
  
23	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Phishing/Spam	
  Year	
  in	
  Review	
  
24	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Protec:ng	
  the	
  world	
  against	
  Internet	
  threats	
  
25	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2015.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Protect	
  users	
   Manage	
  web	
  use	
  
Cloud-­‐based	
  protec0on	
  for	
  any	
  user,	
  anywhere,	
  on	
  any	
  device	
  
Any	
  loca:on,	
  any	
  device	
  
26	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Managing	
  Security	
  Incidents	
  
27	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Managing	
  Security	
  Incidents	
  
28	
  ©2014.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  ©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
You	
  can	
  also	
  find	
  us	
  here:	
  
www.CYREN.com	
  
twiHer.com/cyreninc	
  
linkedin.com/company/cyren	
  
©2016.	
  CYREN	
  Ltd.	
  All	
  Rights	
  Reserved.	
  Proprietary	
  and	
  Confiden@al.	
  
Thank	
  You.	
  Any	
  Ques:ons	
  or	
  Thoughts?	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016NowSecure
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green North Texas Chapter of the ISSA
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverAmit Serper
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareCybereason
 
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...North Texas Chapter of the ISSA
 
INtroduction to Zagros!
INtroduction to Zagros!INtroduction to Zagros!
INtroduction to Zagros!Gita Ziabari
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns CrowdStrike
 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdStrike
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceNowSecure
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingCrowdStrike
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 

Was ist angesagt? (20)

Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection server
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
 
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
 
INtroduction to Zagros!
INtroduction to Zagros!INtroduction to Zagros!
INtroduction to Zagros!
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing Intelligence
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 

Ähnlich wie Webinar: Insights from Cyren's 2016 cyberthreat report

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublinDerek King
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisIan G
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg Tunde Ogunkoya
 
MonkeySpider at Sicherheit 2008
MonkeySpider at Sicherheit 2008MonkeySpider at Sicherheit 2008
MonkeySpider at Sicherheit 2008Ali Ikinci
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveCisco DevNet
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareAmit Serper
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Shannon Williams
 
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...CODE BLUE
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...PROIDEA
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017Adam Faeder
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
SignaturesAreDead Long Live RESILIENT Signatures
SignaturesAreDead Long Live RESILIENT SignaturesSignaturesAreDead Long Live RESILIENT Signatures
SignaturesAreDead Long Live RESILIENT SignaturesDaniel Bohannon
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Hackfest 2019 Talk
Hackfest 2019 TalkHackfest 2019 Talk
Hackfest 2019 TalkRana Khalil
 

Ähnlich wie Webinar: Insights from Cyren's 2016 cyberthreat report (20)

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
 
MonkeySpider at Sicherheit 2008
MonkeySpider at Sicherheit 2008MonkeySpider at Sicherheit 2008
MonkeySpider at Sicherheit 2008
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
 
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  C...
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
SignaturesAreDead Long Live RESILIENT Signatures
SignaturesAreDead Long Live RESILIENT SignaturesSignaturesAreDead Long Live RESILIENT Signatures
SignaturesAreDead Long Live RESILIENT Signatures
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Hackfest 2019 Talk
Hackfest 2019 TalkHackfest 2019 Talk
Hackfest 2019 Talk
 

Mehr von Cyren, Inc

Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Cyren, Inc
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportCyren, Inc
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportCyren, Inc
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamCyren, Inc
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURCyren, Inc
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012Cyren, Inc
 

Mehr von Cyren, Inc (15)

Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound Spam
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012
 

Kürzlich hochgeladen

All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 

Kürzlich hochgeladen (20)

All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

Webinar: Insights from Cyren's 2016 cyberthreat report

  • 1. 1  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  This  document  and  the  contents  therein  are  the  sole  property  of  CYREN  and  may  not  be  transmiHed  or  reproduced  without  CYREN’s  express  wriHen  permission.   CYREN  2016  Cyberthreat  Report   Lior  Kohavi  —  CTO   Avi  Turiel  —  Director  of  Threat  Research   John  Callon  —  Sr.  Director,  Product  Marke@ng  
  • 2. 2  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   §  In  2016:  Detec@on  is  not  the  new  preven@on   §  Sandbox-­‐aware  malware   §  Demo  of  automated  analysis     •  Big  data  and  threat  detec@on   •  Malware  success  indicates  future  trends   •  Incremental  aHack  improvements   •  Yearly  trends       Agenda  
  • 3. 3  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Detec:on   •  Based  on  a  false  percep@on  that  sophis@cated  aHacks  are  too  difficult   to  prevent   •  Detec@ng  breaches  a[er  the  fact  is  all  that  can  be  done     Preven:on   •  Complete  automa@on  of  the  detec@on  framework   •  Includes  advanced  analysis  of  poten@al  threats  to  improve  preven@on   In  2016,  Detec:on  is  not  the  new  preven:on  
  • 4. 4  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   More  and  more  malware  will  learn  and  become  ‘aware’   of  specific  sandboxes,  preven@ng  “detona@on”  of  the   malware  and  subsequent  detec@on.  Cloud-­‐based  mul@-­‐ sandbox  arrays  will  prevent  this,  since  the  malware   can’t  recognize  every  possible  environment.   Predic:on:  Prolifera:on  of  sandbox-­‐aware  malware  
  • 5. 5   Sandbox-­‐aware  malware   Challenges:   §  Malware  detects  OS  features   §  Detects  virtualiza@on  &  debug  tools   §  Runs  only  when  specific  files/registry  keys  are  found   §  Runs  only  on  32/64  bit,  Windows  7/8/10  or  XP   §  Malware  detects  environment  condi@ons   §  Runs  only  in  specific  Domain  names   §  Runs  only  when  specific  systems  are  found  in  network   §  Detects  proxy  sehngs   §  Time  aware  malware   §  Runs  only  in  specific  @mes  of  the  day/week/month   §  Runs  only  in  specific  intervals   §  Runs  only  in  specific  @me  zones   §  Requires  long  run@me  –  hours,  even  days   §  Geo-­‐loca@on  aware  malware   §  Runs  only  in  specific  regions/countries   §  Communica@on   §  Malware  uses  TLS/SSL  to  call  home   §  C&C  server  unavailable  due  to  many  reasons  
  • 6. 6  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   CYREN  Advanced  Malware  Analysis   Arbitrator   Sandbox   A     Sandbox   B   IDS   External     Feeds   Reputa@on   Mobile   Sandbox   Sandbox   Less   OS  Heuris@cs   Network  Heuris@cs   Conclusions    (RSS)                            API    (Raw  Data)                  Repor@ng   URLs,  Malware  samples,  Emails  for  Analysis  
  • 7. 7  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   •  Show  automated  analysis  process   Live  malware  analysis  
  • 8. 8  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   •  “Audible  message”  email  aHachment   •  Bayrob,  Nivdort,  or  Symmi   •  Password  stealer,  bitcoin  miner   •  Uses  memory  dumping  to  prevent   analysis   •  Domain  genera@on  algorithm  (DGA)   u  “simpleques@on.net”   u  “mountainmeasure.net”   u  “winteranger.net”   u  “subjectafraid.net”   •  Evaded  one  sandbox,  detonated  in  the   second  sandbox  allowing  detec@on   “WhatsApp”  audible  message  aPack  
  • 9. 9  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Large  data  analysis  will  help  flag  poten@ally  dangerous   URLs,  IP  addresses,  and  malware  objects  before   employees  fall  vic@m  to  these  threats.   Predic:on:  Big  Data  Analysis  will  find  threats  
  • 10. 10  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   •  Large  data  sources  used  to  stop  known  or  large  threats   •  Also  find  hints  of  lesser-­‐known  threats  hidden  in  malicious  sources   •  Example:   •  CYREN  highlighted  suspicious  URLs  and  IP  addresses  being  accessed  by   employees  at  a  company  that  uses  CYREN  WebSecurity   •  invoice-­‐myups.org   •  217.71.50.24   •  URLs  and  IP  addresses  marked  as  suspicious  based  on  a  range  of   factors   Triggering  “Big  Data”  analysis  
  • 11. 11  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Reputa@on  Calcula@on  –  A  Synergy  of  Insights   webfeed.so[update.org   invoice-­‐myups.org   terminal.vla-­‐engineering.com   217.71.50.24   178.132.203.166   invoiceid-­‐[a-­‐ z0-­‐9]{20}.doc   invoiceid-­‐[a-­‐ z0-­‐9] {20}.pdf.zip   spam  campaign  aHachments   D20aeb6ccc9f9 c258ef158b47c 3f33613141f7af ebfd7bd0e61b0 f76c7061f97   5a6e6396d0573 9f08109c8f9e9e 8eacc2f395c220 1d560963cd39c eb5c36d728   Hash  value   1e5dd90edb81 2ce1d741b6343 9c28cf2934693 e292c8b47fd06 519d7449d7c1c   app.invoice-­‐myups.org   Subdomain  of   Zeus   www-­‐myups.org   okfnjcds@126.co   Registrant  is   no-­‐replays-­‐[0-­‐9a-­‐z]{6}@ups.invoice   no@fica@ons-­‐[0-­‐9a-­‐z]{6} @ups.invoice  
  • 12. 12  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Using  Big  Data  to  Predict  Malware  Trends  
  • 13. 13  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   §  40  to  50  million  emails  distributed  in  short  bursts  las@ng  only  three-­‐   to  five-­‐minutes  each   Map  the  APack  
  • 14. 14  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Malware  will  con@nue  to  be  distributed  via  email,   macro  malware  is  here  to  stay,  con@nued  focus  on  POS   systems,  regional  diversity  of  C&C   Predic:on:  Malware  success  will  be  repeated  
  • 15. 15  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Gunpowder   •  Distributed  via  SMS  messages  through   the  phone’s  contact  list,  under  the   message  “a  fun  game  ^_^.”   •  Hidden  in  old  Nintendo  games  for   Android  and  bundled  with  aggressive   adware   •  Informa@on  stealer   •  Spreads  further  via  SMSs   Notable  2015  Malware  -­‐  Android  
  • 16. 16  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Stegaloader/Gatak   •  Steganography  Malware   •  Malware  arrives  as  a  bundled  file  in  so[ware   cracking  tools   •  Malware  retrieves  the  image,  then  the  hidden   encrypted  data  inside  via  a  steganography   technique   •  Encryp@on  used  for  communica@on  with  C&C   Notable  2015  Malware  -­‐  Windows  
  • 17. 17  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Alina     •  Distribu@on  via  USB  but  also  emailed  macro  malware   •  Targets  credit  card  swipe  systems   •  Most  POS  systems  running  Windows  OS  encrypt  credit  card  data   •  Data  is  briefly  available  unencrypted  in  the  system’s  memory   •  Alina  uses  a  memory  scraping  technique   •  Includes  features  such  as  screen  capture  and  keylogging   •  MalumPoS  targets  POS  so[ware  developed  by  MICROS  (owned  by   Oracle)  widely  used  by  hotels,  restaurants,  and  retailers  in  the  US   Notable  2015  Malware  -­‐  POS  
  • 18. 18  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Malware  year  in  Review  
  • 19. 19  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Increasingly  cybercriminals  will  use  sophis:cated,  yet   subtle,  incremental  changes  in  their  approach  to   cybercrime.   Predic:on:  Incremental  changes  to  threat  techniques  
  • 20. 20  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   •  Subtle,  yet  powerful  changes  to   malware  and  spam  distribu@on   methods  to  improve  the  overall   success  of  threats  and  breach   aHempts   •  Example  –  “the  invoice  that  you   requested”   Incremental  Changes  
  • 21. 21  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   •  Harvest  legi@mate  email  headers   from  compromised  email  accounts   •  Creates  the  appearance  of  a   legi@mately  redirected  newsleHer   •  Designed  to  outwit  an@-­‐spam   systems   Advanced  fake  email  headers    
  • 22. 22  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   §  Sophis@cated  social  engineering   §  Demonstrates  extensive  tools  available  to  cybercriminals   •  Using  aHack  vectors  that  are  ignored     Con:nued  use  of  macro  malware  
  • 23. 23  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Phishing/Spam  Year  in  Review  
  • 24. 24  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Protec:ng  the  world  against  Internet  threats  
  • 25. 25  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2015.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Protect  users   Manage  web  use   Cloud-­‐based  protec0on  for  any  user,  anywhere,  on  any  device   Any  loca:on,  any  device  
  • 26. 26  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Managing  Security  Incidents  
  • 27. 27  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Managing  Security  Incidents  
  • 28. 28  ©2014.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.  ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   You  can  also  find  us  here:   www.CYREN.com   twiHer.com/cyreninc   linkedin.com/company/cyren   ©2016.  CYREN  Ltd.  All  Rights  Reserved.  Proprietary  and  Confiden@al.   Thank  You.  Any  Ques:ons  or  Thoughts?