Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/26/2015
02:20 PM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Zombie IPs Added to IIDsThreat Intelligence Exchange

Intelligence around phishing threats and malicious IP addresses being used for botnets added into one of the world's largest commercial cyberthreat data exchanges

TACOMA, Wash. and MCLEAN, Va. – August 26, 2015 – IID, the source for clear cyberthreat intelligence, today announced CYREN (NASDAQ: CYRN)

has made its Phishing Intelligence Feed and Malicious IP Intelligence Feed available in IID’s big data solution for Internet security—ActiveTrust. By accessing CYREN data in ActiveTrust, IID clients get insight into the latest phishing threats as well as IP addresses being used for botnets—computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers. Organizations can automatically feed that intelligence into their cybersecurity appliances; ensuring cyberthreats are mitigated in a timely, efficient and effective manner.

“By gaining global intelligence at super-fast speeds, CYREN’s technology enables trusted partners such as IID to further strengthen the protection they offer their extensive customer base,” said Einat Glik, vice president and general manager, Email Security at CYREN. “We are pleased to team with IID to proactively protect against ever-evolving malicious threats.”

CYREN’s Zombie IP Feed contains a list of IP addresses that are sending spam and/or participating in other cybercrimes. The list contains anywhere from 5 to 12 million IP addresses. CYREN’s daily analysis of billions of Internet transactions provides thousands of new phishing URLs to its Phishing Intelligence Feed daily, the instant they find them. With today’s announcement, the unfettered CYREN intelligence is available in the ActiveTrust dashboard, meaning it can be input it into any organization’s cybersecurity infrastructure with no formatting via ActiveTrust as easily as IID’s own curated data.

“Approximately 500 million computers globally are infected each year and the phishing epidemic shows no signs of slowing down,” said IID President and CTO Rod Rasmussen. “Because it’s unrealistic to think we’ll completely take down these intricate cybercrime networks responsible for botnets and phishing, it’s essential organizations get the latest data on where these threats live and CYREN provides this.”

In addition to premium data like from CYREN, IID distills, analyzes and inputs the cyberthreat intelligence from thousands of sources like governance and guidance organizations, law enforcement, Internet service providers, and other Internet security experts and groups worldwide into ActiveTrust. By providing this extra layer of context, ActiveTrust makes sense of what is relevant for organizations. Dozens of Fortune 500 companies and U.S. government agencies rely on ActiveTrust data to detect and mitigate threats, making it one of the world’s largest commercial cyberthreat data exchanges.

For more information about the IID-CYREN partnership, go to internetidentity.com/partners/CYREN.

About CYREN

Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a 20 year ICSA Service Excellence award winner in cybersecurity. Through full-function Security as a Service (SecaaS) and embedded deployment options, CYREN provides web, email, mobile and endpoint security solutions that are relied upon by the world's largest companies to protect against today's advanced threats. CYREN collects threat data and delivers real-time cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users. To learn more, visit www.cyren.com.

Blog: blog.cyren.com
Facebook: www.facebook.com/CyrenWeb
LinkedIn: www.linkedin.com/company/cyren
Twitter: twitter.com/CyrenInc

About IID

IID is a cybersecurity company. Its flagship product, ActiveTrust, adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into actionable intelligence delivered to security professionals and automated infrastructure. Fortune 500 companies and U.S. government agencies leverage IID to detect and mitigate threats, making ActiveTrust one of the world’s largest commercial cyberthreat data exchanges. For more, go to internetidentity.com.

© 2015 CYREN Ltd. CYREN and GlobalView are trademarks of CYREN Ltd. Other company and product names may be trademarks of their respective owners.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).