First to Detect. First to Protect.

Threat intelligence at cloud speed

Cyren threat intelligence empowers service providers, technology vendors and large enterprises with the real-time detection capabilities of our global security cloud.

Learn more

Protect your Office 365 users against evasive phishing attacks with inbox security.

Learn more

Stay up to date with the latest in cybersecurity from Cyren

Phishing Topic Icon

The Phishing Issue: From Targeted Attacks to Evasive Phishing

Download report

White Paper:
A New Vision for Phishing Defense: Inbox Detection & Response

Download white paper
Phishing Topic Icon

On-Demand Webinar:
Selecting and Integrating Real-Time Cloud Threat Intelligence

View

Internet security that protects at cloud speed

Widest cloud visibility

By analyzing billions of daily transactions, Cyren achieves unparallelled threat visibility.

Always up to date

As a cloud-native solution, Cyren is always up to date, ensuring you're always protected.

Cross-vector

Full coverage of all internet threat vectors including web, email, and DNS.

Cross-geo

Comprehensive view of global traffic ranging across geographies, languages, and protocols.

Real-time

Leverage big data analytics, AI, and machine learning to identify even the most evasive threats.

Architected for cloud scale

Unknown Threat Detection

  • Cyren proprietary detection engines leveraging big data analytics, advanced heuristics, recurrent pattern detection, behavioral sandboxing, and machine learning technologies
  • Single-pass streaming architecture applies multiple detection techniques in parallel
  • Fully automated real-time threat identification with zero human intervention
  • Multi-vector threat analysis across web, DNS, email, and files
  • Distributed, massively scalable, fault tolerant

Recent blog posts

Phishing Targeting Real Estate Firms

by John Callon

For the last three years, stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper and blog headlines. Take for example the cybercriminals who stole client contact information from a DC-area real estate company, and then created a “business email compromise” (BEC) scam, which resulted in $1.5 million being stolen in a phishing/wire fraud scheme from a couple about to close on a home.

Apple Phishing Bait Has a Lot of Hooks

by Maharlito Aquino and Kervin Alintanahin

In general, a lot of phishing has been moving the embedded links the recipient is intended to click on from the body of the email into an attachment, in order to increase the odds of evading detection and, we theorize, as a kind of “social engineering” ploy to move the user along quickly and get them into a clicking frame of mind. During recent analysis of malicious PDF samples, we saw a lot of Apple-themed phishing content and thought it might be instructive to share how rich and varied the world of Apple phishing has become. We illustrate this with some real-world examples for you. From purchases in the app store to a range of activities using one’s Apple ID, threat actors have developed many ways to entice users to click on that malicious link that leads to the theft of precious Apple credentials.

Emotet: From a Banking Trojan to One of the Most Advanced Botnets

by Tinna Thuridur Sigurdardottir and Sarah Neubauer

Email Security Malware Threat Analysis

In 2014, the Emotet malware started as a banking Trojan targeting European bank customers. Back then, nobody expected this malware would evolve into one of the most dangerous botnets in the world.

Ransomware Overshadowed by Phishing, But It's Not Dead Yet

by John Callon

Industry Insights Malware Ransomware

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a single ransomware out there to capture the collective imagination like Locky did in 2016, but don't be misled—ransomware continues alive and well. Recent targeted Ryuk attacks have been hammering businesses, like the December infection at Tribune Publishing in Chicago.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily