First to Detect. First to Protect.

Threat intelligence at cloud speed

Cyren threat intelligence empowers service providers, technology vendors and large enterprises with the real-time detection capabilities of our global security cloud.

Learn more

Protect your Office 365 users against evasive phishing attacks with inbox security.

Learn more

Stay up to date with the latest in cybersecurity from Cyren

Phishing Topic Icon

Osterman White Paper:
Using Third-Party Solutions With Office 365

Download white paper

White Paper:
A New Vision for Phishing Defense: Inbox Detection & Response

Download white paper
Phishing Topic Icon

On-Demand Webinar:
Selecting and Integrating Real-Time Cloud Threat Intelligence

View

Internet security that protects at cloud speed

Widest cloud visibility

By analyzing billions of daily transactions, Cyren achieves unparallelled threat visibility.

Always up to date

As a cloud-native solution, Cyren is always up to date, ensuring you're always protected.

Cross-vector

Full coverage of all internet threat vectors including web, email, and DNS.

Cross-geo

Comprehensive view of global traffic ranging across geographies, languages, and protocols.

Real-time

Leverage big data analytics, AI, and machine learning to identify even the most evasive threats.

Architected for cloud scale

Unknown Threat Detection

  • Cyren proprietary detection engines leveraging big data analytics, advanced heuristics, recurrent pattern detection, behavioral sandboxing, and machine learning technologies
  • Single-pass streaming architecture applies multiple detection techniques in parallel
  • Fully automated real-time threat identification with zero human intervention
  • Multi-vector threat analysis across web, DNS, email, and files
  • Distributed, massively scalable, fault tolerant

Recent blog posts

Evasive Phishing Driven by Phishing-as-a-Service

by Tinna Thuridur Sigurdardottir and Magni Sigurdsson

Cyren’s research lab has turned up 5,334 new, unique phishing kits deployed to the web so far this year, an indication of the scope and scale of turn-key phishing offerings.

Attack Exploits Vulnerability in Half of Email MTAs Globally

by Tobias Herkula

Attacks predicted for a freshly reported email server vulnerability have come true in less than a week. If you’re an email administrator, you should be aware of the attacks this week targeting a vulnerability in the Exim MTA server code (versions 4.87 to 4.91), the objective of which is to create a backdoor that could then be exploited for almost anything, since with the backdoor in place, the attackers would then have full root access on the server. 

A view from the exhibition floor: three takeaways from Infosecurity Europe

by Duncan Mills

infosec Infosecurity Europe

This year’s Infosecurity Europe yet again made me realise that I am privileged to work in such an exciting industry. As always, there was a lot of hype to cut through, but once you did, there were great insights to be found. Here are my top three takeaways from walking the floor.

It’s Back! Facebook Cryptominer Worm Reemerges

by Maharlito Aquino and Kervin Alintanahin

Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant today—referring to both the blog and the malware. At the time we analyzed part of the 2017 Digmine campaign that installed a cryptominer payload, and (lo and behold!) just last month this campaign reemerged on Facebook with a new variant that uses the files section of Facebook groups and employs tactics similar to those used two years ago. We decided to monitor and do a breakdown of one of them in order to discover if there is really any new behavior we might alert you to.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily