First to Detect. First to Protect.

Threat intelligence at cloud speed

Cyren threat intelligence empowers service providers, technology vendors and large enterprises with the real-time detection capabilities of our global security cloud.

Learn more

Protect your Office 365 users against evasive phishing attacks.

Learn more

Stay up to date with the latest in cybersecurity from Cyren

Phishing Topic Icon

Osterman White Paper:
Using Third-Party Solutions With Office 365

Download white paper

Live Webinar:
Malware in 2020 - Recent Trends and What Is Coming Next

Register
Phishing Topic Icon

On-Demand Webinar:
Selecting and Integrating Real-Time Cloud Threat Intelligence

View

Meet with Cyren at RSA Conference 2020

Internet security is a race against time. Cyren's global threat intelligence and messaging security solutions win that race over 300 million times each and every day for our security, service provider and enterprise customers.

Schedule a Cyren demo
RSAC 2020 logo

Internet security that protects at cloud speed

Widest cloud visibility

By analyzing billions of daily transactions, Cyren achieves unparallelled threat visibility.

Always up to date

As a cloud-native solution, Cyren is always up to date, ensuring you're always protected.

Cross-vector

Full coverage of all internet threat vectors including web, email, and DNS.

Cross-geo

Comprehensive view of global traffic ranging across geographies, languages, and protocols.

Real-time

Leverage big data analytics, AI, and machine learning to identify even the most evasive threats.

Architected for cloud scale

Unknown Threat Detection

  • Cyren proprietary detection engines leveraging big data analytics, advanced heuristics, recurrent pattern detection, behavioral sandboxing, and machine learning technologies
  • Single-pass streaming architecture applies multiple detection techniques in parallel
  • Fully automated real-time threat identification with zero human intervention
  • Multi-vector threat analysis across web, DNS, email, and files
  • Distributed, massively scalable, fault tolerant

Recent blog posts

Top 20 Brands Targeted for Yuletide Phishing

by Duncan Mills

Internet platforms, financial sites, and shopping brands are still the most popular targets for phishing, according to new research from the Cyren Security Lab.

Exploiting CAPTCHA: The Latest Evasive Phishing Tactic

by Duncan Mills

The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) has been used in commercial applications since the early 2000s. As its name suggests, it is a mechanism for ascertaining that a real, live human is performing an action at a web site. CAPTCHA is generated by distorting letters and numbers in such a way that a computer using OCR cannot resolve it. Typical applications were originally centered on authentication. For example, if you enter an incorrect password multiple times, you might be presented with a CAPTCHA to ensure that a bot is not attempting to brute force a login. Today there are other applications, such as preventing bots automatically posting good product reviews to falsify scores on review sites. 

Suspected BEC Campaign Targeting Banks

by Maharlito Aquino and Kervin Alintanahin

In the past week we've been receiving reports of different—but seemingly related—email malware campaigns targeting banks in both the US and Europe, specifically in the form of Excel Workbooks containing a malicious macro being sent as an attachment to emails. What's interesting is that even though the email themes used are varied, the attached bait documents are mostly similar.

Is The Email Security Industry About To Lose Another Major Vendor?

by Duncan Mills

Symantec’s acquisition by Broadcom, announced recently, represents yet another major change for this cyber security vendor and service provider.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily