Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more
 

Find the gaps in your email security

Get a free and easy-to-deploy assessment of the effectiveness of your current email security, including steps you can take to better protect your organization.

Office365 logo

Protect your Office 365 users against evasive phishing attacks with Cyren Email Security.

Learn more

Join Cyren at Digital Transformation EXPO - Booth F30

Internet security is a race against time. More than 1.3 billion global users are winning that race with Cyren's 100% cloud internet security solutions, which protect them against cyber attacks and data loss every day. Find out how at this year's Digital Transformation EXPO.

Book a Cyren demo
Digital Transformation EXPO 2019 logo

Internet security that protects at cloud speed

More than 1.3 billion users around the world rely on Cyren's 100% cloud security solutions to protect them against cyberattacks and data loss every day. Powered by the world's largest security cloud, Cyren delivers fast time-to-protection with an advanced suite of security services for businesses and detection technologies for service providers and security vendors.

Learn more

Relying on Cyren Threat Intelligence

Google logo
Microsoft logo
SoncWall logo
Checkpoint logo
McAfee logo
T-Mobile logo

Cyren's threat intelligence solutions are utilized by over 200 technology and security vendors, including industry leaders Google, Microsoft, and Check Point, who trust Cyren to help safeguard their users by analyzing over 25 billion transactions across multiple threat vectors every day.

Recognized by industry leaders

Experience award-winning Cyren Email Security protection for your organization.

Cyren wins Second Consecutive CyberSecurity Breakthrough Award!

Silver Stevie Winner - International Business Awards

Cyren wins 2019 Cybersecurity Excellence Award

Cybersecurity Excellence Awards 2019 - Email Security

The best cyber intelligence

The broadest threat visibility

The Cyren cloud processes over 25 billion transactions generated by over 1 billion users daily to assemble an unmatched view of cyber threats as they emerge. As a result, Cyren identifies and classifies thousands of new IP addresses, phishing sites, and malicious URLs every day, providing the best threat data in the industry.

Big data analytics

Cyren’s data collection footprint and patented detection capabilities combine with extensive expertise in Big Data, advanced heuristics, and machine learning to build actionable global security intelligence on a near-real-time basis. Our cloud platform automatically investigates and correlates IP addresses, domains, hosts, and files associated with suspicious behavior, builds risk scores, and is capable of instantaneous reclassification.

Enterprise security at cloud speed

Our cloud-based DNS, email secure gateway, and cloud sandboxing services for enterprises are powered by the Cyren GlobalView Cloud. Intelligence gained from any transaction within the Cyren cybersecurity platform instantly updates protection for all users – protecting from malicious messages, hosts, and websites.

Recent blog posts

A view from the exhibition floor: three takeaways from Infosecurity Europe

by Duncan Mills

infosec Infosecurity Europe

This year’s Infosecurity Europe yet again made me realise that I am privileged to work in such an exciting industry. As always, there was a lot of hype to cut through, but once you did, there were great insights to be found. Here are my top three takeaways from walking the floor.

It’s Back! Facebook Cryptominer Worm Reemerges

by Maharlito Aquino and Kervin Alintanahin

Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant today—referring to both the blog and the malware. At the time we analyzed part of the 2017 Digmine campaign that installed a cryptominer payload, and (lo and behold!) just last month this campaign reemerged on Facebook with a new variant that uses the files section of Facebook groups and employs tactics similar to those used two years ago. We decided to monitor and do a breakdown of one of them in order to discover if there is really any new behavior we might alert you to.

Phishing Targeting Real Estate Firms

by John Callon

For the last three years, stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper and blog headlines. Take for example the cybercriminals who stole client contact information from a DC-area real estate company, and then created a “business email compromise” (BEC) scam, which resulted in $1.5 million being stolen in a phishing/wire fraud scheme from a couple about to close on a home.

Apple Phishing Bait Has a Lot of Hooks

by Maharlito Aquino and Kervin Alintanahin

In general, a lot of phishing has been moving the embedded links the recipient is intended to click on from the body of the email into an attachment, in order to increase the odds of evading detection and, we theorize, as a kind of “social engineering” ploy to move the user along quickly and get them into a clicking frame of mind. During recent analysis of malicious PDF samples, we saw a lot of Apple-themed phishing content and thought it might be instructive to share how rich and varied the world of Apple phishing has become. We illustrate this with some real-world examples for you. From purchases in the app store to a range of activities using one’s Apple ID, threat actors have developed many ways to entice users to click on that malicious link that leads to the theft of precious Apple credentials.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily