Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more
 

Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more

Internet security that protects at cloud speed

More than 1.3 billion users around the world rely on Cyren's 100% cloud security solutions to protect them against cyberattacks and data loss every day. Powered by the world's largest security cloud, Cyren delivers fast time-to-protection with an advanced suite of security services for businesses and detection technologies for service providers and security vendors.

Learn more

Relying on Cyren Threat Intelligence

Google logo
Microsoft logo
SoncWall logo
Checkpoint logo
McAfee logo
T-Mobile logo

Cyren's threat intelligence solutions are utilized by over 200 technology and security vendors, including industry leaders Google, Microsoft, and Check Point, who trust Cyren to help safeguard their users by analyzing over 25 billion transactions across multiple threat vectors every day.

Recognized by industry leaders

Experience award-winning Cyren Email Security protection for your organization.

Cyren wins Second Consecutive CyberSecurity Breakthrough Award!

Silver Stevie Winner - International Business Awards

Cyren wins 2019 Cybersecurity Excellence Award

Cybersecurity Excellence Awards 2019 - Email Security

The best cyber intelligence

The broadest threat visibility

The Cyren cloud processes over 25 billion transactions generated by over 1 billion users daily to assemble an unmatched view of cyber threats as they emerge. As a result, Cyren identifies and classifies thousands of new IP addresses, phishing sites, and malicious URLs every day, providing the best threat data in the industry.

Big data analytics

Cyren’s data collection footprint and patented detection capabilities combine with extensive expertise in Big Data, advanced heuristics, and machine learning to build actionable global security intelligence on a near-real-time basis. Our cloud platform automatically investigates and correlates IP addresses, domains, hosts, and files associated with suspicious behavior, builds risk scores, and is capable of instantaneous reclassification.

Enterprise security at cloud speed

Our cloud-based DNS, email secure gateway, and cloud sandboxing services for enterprises are powered by the Cyren GlobalView Cloud. Intelligence gained from any transaction within the Cyren cybersecurity platform instantly updates protection for all users – protecting from malicious messages, hosts, and websites.

Recent blog posts

Exploiting CAPTCHA: The Latest Evasive Phishing Tactic

by Duncan Mills

The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) has been used in commercial applications since the early 2000s. As its name suggests, it is a mechanism for ascertaining that a real, live human is performing an action at a web site. CAPTCHA is generated by distorting letters and numbers in such a way that a computer using OCR cannot resolve it. Typical applications were originally centered on authentication. For example, if you enter an incorrect password multiple times, you might be presented with a CAPTCHA to ensure that a bot is not attempting to brute force a login. Today there are other applications, such as preventing bots automatically posting good product reviews to falsify scores on review sites. 

Suspected BEC Campaign Targeting Banks

by Maharlito Aquino and Kervin Alintanahin

In the past week we've been receiving reports of different—but seemingly related—email malware campaigns targeting banks in both the US and Europe, specifically in the form of Excel Workbooks containing a malicious macro being sent as an attachment to emails. What's interesting is that even though the email themes used are varied, the attached bait documents are mostly similar.

Is The Email Security Industry About To Lose Another Major Vendor?

by Duncan Mills

Symantec’s acquisition by Broadcom, announced recently, represents yet another major change for this cyber security vendor and service provider.

Open Source Ransomware Targets Fortnite Users

by Maharlito Aquino and Kervin Alintanahin

The global gaming phenomenon Fortnite has a huge global user base – last reported in March at 250 million gamers – and the just-concluded Fortnite World Cup with its $30 million prize pool and an online viewing audience of over two million has certainly only added to its allure. Over 40 million Fortnite gamers competed in qualifying rounds to get one of the 100 coveted spots in the World Cup and a guaranteed $50,000 payout, plus a shot at the $3 million top prize (won by a 16-year old!). Given the size of the global player pool and the evident motivation to up one’s game, it comes as no surprise that cybercriminals are now targeting Fortnite users by leveraging their competitive zeal.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily