Cyren logo

Cyren Newsletter | February 2018

Cryen Cloud Security Email Reports.png

Cyren Cloud Security update stops imposter phishing, cryptocurrency mining

The release of Cyren Cloud Security 4.3 introduces a raft of new functionality to further protect web and email users and enhance their experience through Single Sign-On (SSO) and other improvements. New protection highlights include:

Imposter phishing defense

New email security features include detection enhancements to stop targeted “imposter” emails, where a criminal might research your organization and replace the displayed sender name with that of your CEO, perhaps (if you work in the Finance Department or HR) requesting tax records on all the employees or a funds transfer. For more on “Business Email Compromise” and how to stop it, check out this in-depth blog.

Protection from cryptocurrency mining

With 2018 declared by some the “Year of Cryptomining Malware,” Cyren is introducing specific detection, protection and reporting for this emerging category of threat. Read this recent blog about a Google Chrome exploit grabbing Facebook users’ CPU to run Coinminer, or for background check out this blog from October.

Access controls for cloud applications

We’ve extended cloud application access controls to provide further insight into the extent of “shadow IT” at your company and enable you to properly control your network, all integrated into Cyren Web Security.

Cyren Aberdeen webinar banner

Upcoming Analyst Webinar: Understand and Reduce the Risk of Phishing Attacks

Don’t miss this live webinar on February 22 from Derek Brink of Aberdeen Group, an expert on data-driven analysis of IT security risks and solutions, who will share findings on why phishing emails are still getting through your security, the importance of taking into account the “long tail of risk,” the real cost of phishing attacks and the ROI on enhanced security, and the Best-in-Class strategies to reduce and manage these risks.


Cyren In The News

PRNewsire - Cyren (NASDAQ: CYRN) announced a distribution partnership with CARVIR to provide Cyren's SaaS gateway security solutions for MSPs and IT... READ MORE >
SecurityWeek - It is not an exaggeration to say that without each other, ransomware and Bitcoin might not exist at all. I think it’s largely understood that the rise of a virtual... READ MORE >
eWeek - At first look, a failure rate of 10.5 percent doesn’t sound like a lot, at least until you realize that that’s the percentage of emails that online security systems apparently miss when they’re looking for spam, malware and phishing... READ MORE >

More Live And Virtual Events Hosted By Cyren

Phishing image
Live Webinar
Reducing the Risk of Phishing Attacks
February 22, 2018
M3AAWG 42nd General Meeting
The session "The Current State of Malware & Its Defense" on Thursday at noon in the 1-Grand Ballroom will be co-moderated by Cyren’s VP of Threat Research Siggi Stefnisson, with a presentation by Cyren Senior Security Analyst Magni Sigurdsson covering the latest email malware trends and threat mechanics.
February 19-22, 2018
San Francisco, CA


Xchange Solution Provider 2018

The largest, independent gathering of the IT channel’s premiere solution providers and technology vendors

March 4-6, 2018
Orlanda, FL
RSA 2018 logo
RSA Conference 2018
Internet security is a race against time. More than 1.3 billion global users are winning that race with Cyren’s 100% cloud internet security solutions, which protect them against cyber attacks and data loss every day. Find out how at this year’s RSA Conference - if needed, use Cyren's coupon code  X8ECYREN for a FREE expo pass!
April 16-20, 2018
San Francisco, CA

Cyren Blog Posts You Might Have Missed

Business Email Compromise (Imposter) Attacks Are Not Going Away

Business email compromise (BEC) attacks have been increasing in number over the last few years, driven by their relative success rate compared to other financially motivated attacks. They appear to be quite simple...


Interview with a Botnet Hunter

In this interview, a botnet expert explains how botnets work and gives a view from the trenches on successes and challenges in fighting botnet cybercrime.


Facebook Users Hit With Coinminer Malware

Earlier this year, the value of Bitcoin virtual currency hit an all-time high, with it an increasing number of malware threats are targeting users to "borrow" their PC's CPU for use in mining the precious cryptocurrency.


Analyst Report: Phishing Attacks Are a Business Problem, Not an IT Problem

Successful phishing attacks are all over the news and a top concern for IT managers, but how do you make the business case for adding more advanced...



How good is your web security?