First to Detect. First to Protect.

Threat intelligence at cloud speed

Cyren threat intelligence empowers service providers, technology vendors and large enterprises with the real-time detection capabilities of our global security cloud.

Learn more

Protect your Office 365 users against evasive phishing attacks.

Learn more

Stay up to date with the latest in cybersecurity from Cyren

Phishing Topic Icon

Osterman White Paper: Using Third-Party Solutions With Office 365

Download white paper

Email Security Gap Analysis: Aggregated Results

Download report
Phishing Topic Icon

Webinar: Selecting and Integrating Real-Time Cloud Threat Intelligence

View

Internet security that protects at cloud speed

Widest cloud visibility

By analyzing billions of daily transactions, Cyren achieves unparallelled threat visibility.

Always up to date

As a cloud-native solution, Cyren is always up to date, ensuring you're always protected.

Cross-vector

Full coverage of all internet threat vectors including web, email, and DNS.

Cross-geo

Comprehensive view of global traffic ranging across geographies, languages, and protocols.

Real-time

Leverage big data analytics, AI, and machine learning to identify even the most evasive threats.

Architected for cloud scale

Unknown Threat Detection

  • Cyren proprietary detection engines leveraging big data analytics, advanced heuristics, recurrent pattern detection, behavioral sandboxing, and machine learning technologies
  • Single-pass streaming architecture applies multiple detection techniques in parallel
  • Fully automated real-time threat identification with zero human intervention
  • Multi-vector threat analysis across web, DNS, email, and files
  • Distributed, massively scalable, fault tolerant

Recent blog posts

Open Source Ransomware Targets Fortnite Users

by Maharlito Aquino and Kervin Alintanahin

The global gaming phenomenon Fortnite has a huge global user base – last reported in March at 250 million gamers – and the just-concluded Fortnite World Cup with its $30 million prize pool and an online viewing audience of over two million has certainly only added to its allure. Over 40 million Fortnite gamers competed in qualifying rounds to get one of the 100 coveted spots in the World Cup and a guaranteed $50,000 payout, plus a shot at the $3 million top prize (won by a 16-year old!). Given the size of the global player pool and the evident motivation to up one’s game, it comes as no surprise that cybercriminals are now targeting Fortnite users by leveraging their competitive zeal.

Test the Effectiveness of Your Email Security

by Duncan Mills

Do you keep seeing phishing emails getting through to users, and wish you could quantify how effective your email security is—or isn't? Email is the main vehicle for introducing malware into an organization, and is practically synonymous with phishing these days, so it is a sensible idea to get a grasp on whether your security is doing its job well or poorly — but lots of people don't. Here at Cyren we know how eye-opening such an evaluation can be, as the email security "gap analyses" that we performed for a series of organizations in 2018 showed that an average 7.2% of email protected by a number of email security products, but still reaching users, was spam or contained a threat. 

Evasive Phishing Driven by Phishing-as-a-Service

by Tinna Thuridur Sigurdardottir and Magni Sigurdsson

Cyren’s research lab has turned up 5,334 new, unique phishing kits deployed to the web so far this year, an indication of the scope and scale of turn-key phishing offerings.

Attack Exploits Vulnerability in Half of Email MTAs Globally

by Tobias Herkula

Attacks predicted for a freshly reported email server vulnerability have come true in less than a week. If you’re an email administrator, you should be aware of the attacks this week targeting a vulnerability in the Exim MTA server code (versions 4.87 to 4.91), the objective of which is to create a backdoor that could then be exploited for almost anything, since with the backdoor in place, the attackers would then have full root access on the server. 

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily