1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
CYREN Security Yearbook 2015
Lior Kohavi, Avi Turiel
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 2014 – Looking Back
 Protecting the Enterprise
• Mapping the Attack
• Predicting Malware in Advance
 The return of the Macro-Virus
 Phishing – Gateway to the Breach
 Malware on the Move
 Rapid Spam Attacks
 Assessing Industrial IoT Threats in 2015 and Beyond
Agenda
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE
THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time
innovator in cybersecurity. With full-function Security as a Service
(SecaaS) solutions and security technology components for
embedded deployments, CYREN provides web, email, endpoint and
mobile security solutions that the world’s largest IT companies trust
for protection against today’s advanced threats. CYREN collects
threat data and delivers cyber intelligence through a unique global
network of over 500,000 points of presence that processes 17 billion
daily transactions and protects 600 million users.
3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence is the security backbone of many of the world’s largest and
most influential information technology and Internet security brands.
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Cybersecurity by the Numbers
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 Breaches such as Home Depot made the news… but..
 Enterprises are besieged by cybercrime at an alarming
rate: During the four-year period 2010-2014, the:
• Number of successful cyberattacks on businesses of all
sizes increased by 144%
• Cost of cybercrime per company increased by 95%
• Average time to resolve incidents increased by 221%
 Business leaders must think about solutions that
utilize cyber intelligence from industry experts
2014 – Looking Back
Cybercriminals
can sell personally
identifiable
information (PII),
such as the type
recently stolen
from Blue Cross
Blue Shield
Anthem, for 10
times more than
credit card data
on the black
market.
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 In this section, we use in-depth analysis of individual threats
captured by CYREN in 2014, to illustrate:
• How cybercriminals engage in the business of crime
• How they target the enterprise
• What CYREN is doing to halt the advance of cybercrime
Protecting the Enterprise
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 40 to 50 million emails distributed in short bursts lasting only three-
to five-minutes each
Map the Attack
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Using Botnet Data to Predict Malware Trends
 CYREN Analysts are
observing a direct
relationship
between zombies
and malware,
enabling future
malware attack
prediction.
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 Sophisticated social engineering
 Demonstrates extensive tools available to cybercriminals
• Using attack vectors that are ignored
Return of the Macro-virus
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Malware Year in Review
Malware Emails Malware URLs Zero-hour
Malware
detection
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 Attacks aimed at businesses and consumers
 Often a 1st step to corporate breach
 Postbank.de attack
• Estimated 6.5 billion emails sent during the
1st day of the attack
• 19,000 different URLs in one 12-hour period
• Total of 78,000 unique URLs distributed over
a few days
Phishing – Gateway to the Breach
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing Year in Review
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 CYREN predicts continued growth in Mobile
Malware
• Mobile Ransomware
• Near Field Communications Malware
• Pre-installed Mobile Malware
Malware on the Move
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Mobile Malware year in Review
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 40 to 50 million emails sent in short bursts lasting only three- to
five-minutes each
Rapid Spam Attacks
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Spam Year in Review
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Assessing Industrial IoT Threats in 2015 and Beyond
 In the coming year, the enterprise – from its people, to its devices,
to its physical infrastructure – will be more connected than ever
 Includes industrial items like building management and physical security,
connecting to ‘smart’ platforms
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook

  • 1.
    1©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. CYREN Security Yearbook 2015 Lior Kohavi, Avi Turiel
  • 2.
    2©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  2014 – Looking Back  Protecting the Enterprise • Mapping the Attack • Predicting Malware in Advance  The return of the Macro-Virus  Phishing – Gateway to the Breach  Malware on the Move  Rapid Spam Attacks  Assessing Industrial IoT Threats in 2015 and Beyond Agenda
  • 3.
    3©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. About CYREN THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator in cybersecurity. With full-function Security as a Service (SecaaS) solutions and security technology components for embedded deployments, CYREN provides web, email, endpoint and mobile security solutions that the world’s largest IT companies trust for protection against today’s advanced threats. CYREN collects threat data and delivers cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users. 3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
  • 4.
    4©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Powers the World’s Security Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.
  • 5.
    5©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Cybersecurity by the Numbers
  • 6.
    6©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Poll Question
  • 7.
    7©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  Breaches such as Home Depot made the news… but..  Enterprises are besieged by cybercrime at an alarming rate: During the four-year period 2010-2014, the: • Number of successful cyberattacks on businesses of all sizes increased by 144% • Cost of cybercrime per company increased by 95% • Average time to resolve incidents increased by 221%  Business leaders must think about solutions that utilize cyber intelligence from industry experts 2014 – Looking Back Cybercriminals can sell personally identifiable information (PII), such as the type recently stolen from Blue Cross Blue Shield Anthem, for 10 times more than credit card data on the black market.
  • 8.
    8©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  In this section, we use in-depth analysis of individual threats captured by CYREN in 2014, to illustrate: • How cybercriminals engage in the business of crime • How they target the enterprise • What CYREN is doing to halt the advance of cybercrime Protecting the Enterprise
  • 9.
    9©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  40 to 50 million emails distributed in short bursts lasting only three- to five-minutes each Map the Attack
  • 10.
    10©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Using Botnet Data to Predict Malware Trends  CYREN Analysts are observing a direct relationship between zombies and malware, enabling future malware attack prediction.
  • 11.
    11©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  Sophisticated social engineering  Demonstrates extensive tools available to cybercriminals • Using attack vectors that are ignored Return of the Macro-virus
  • 12.
    12©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Malware Year in Review Malware Emails Malware URLs Zero-hour Malware detection
  • 13.
    13©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  Attacks aimed at businesses and consumers  Often a 1st step to corporate breach  Postbank.de attack • Estimated 6.5 billion emails sent during the 1st day of the attack • 19,000 different URLs in one 12-hour period • Total of 78,000 unique URLs distributed over a few days Phishing – Gateway to the Breach
  • 14.
    14©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Phishing Year in Review
  • 15.
    15©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  CYREN predicts continued growth in Mobile Malware • Mobile Ransomware • Near Field Communications Malware • Pre-installed Mobile Malware Malware on the Move
  • 16.
    16©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Mobile Malware year in Review
  • 17.
    17©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  40 to 50 million emails sent in short bursts lasting only three- to five-minutes each Rapid Spam Attacks
  • 18.
    18©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Spam Year in Review
  • 19.
    19©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Poll Question
  • 20.
    20©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Assessing Industrial IoT Threats in 2015 and Beyond  In the coming year, the enterprise – from its people, to its devices, to its physical infrastructure – will be more connected than ever  Includes industrial items like building management and physical security, connecting to ‘smart’ platforms
  • 21.
    21©2014. CYREN Ltd.All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. You can also find us here: www.CYREN.com twitter.com/cyreninc linkedin.com/company/cyren ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Thank You. Any Questions or Thoughts?