First to Detect. First to Protect.

Threat intelligence at cloud speed

Cyren threat intelligence empowers service providers, technology vendors and large enterprises with the real-time detection capabilities of our global security cloud.

Learn more

Protect your Office 365 users against evasive phishing attacks.

Learn more

Stay up to date with the latest in cybersecurity from Cyren

Phishing Topic Icon

Osterman White Paper: Using Third-Party Solutions With Office 365

Download white paper

Email Security Gap Analysis: Aggregated Results

Download report
Phishing Topic Icon

Webinar: Selecting and Integrating Real-Time Cloud Threat Intelligence

View

Internet security that protects at cloud speed

Widest cloud visibility

By analyzing billions of daily transactions, Cyren achieves unparallelled threat visibility.

Always up to date

As a cloud-native solution, Cyren is always up to date, ensuring you're always protected.

Cross-vector

Full coverage of all internet threat vectors including web, email, and DNS.

Cross-geo

Comprehensive view of global traffic ranging across geographies, languages, and protocols.

Real-time

Leverage big data analytics, AI, and machine learning to identify even the most evasive threats.

Architected for cloud scale

Unknown Threat Detection

  • Cyren proprietary detection engines leveraging big data analytics, advanced heuristics, recurrent pattern detection, behavioral sandboxing, and machine learning technologies
  • Single-pass streaming architecture applies multiple detection techniques in parallel
  • Fully automated real-time threat identification with zero human intervention
  • Multi-vector threat analysis across web, DNS, email, and files
  • Distributed, massively scalable, fault tolerant

Recent blog posts

A view from the exhibition floor: three takeaways from Infosecurity Europe

by Duncan Mills

infosec Infosecurity Europe

This year’s Infosecurity Europe yet again made me realise that I am privileged to work in such an exciting industry. As always, there was a lot of hype to cut through, but once you did, there were great insights to be found. Here are my top three takeaways from walking the floor.

It’s Back! Facebook Cryptominer Worm Reemerges

by Maharlito Aquino and Kervin Alintanahin

Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant today—referring to both the blog and the malware. At the time we analyzed part of the 2017 Digmine campaign that installed a cryptominer payload, and (lo and behold!) just last month this campaign reemerged on Facebook with a new variant that uses the files section of Facebook groups and employs tactics similar to those used two years ago. We decided to monitor and do a breakdown of one of them in order to discover if there is really any new behavior we might alert you to.

Phishing Targeting Real Estate Firms

by John Callon

For the last three years, stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper and blog headlines. Take for example the cybercriminals who stole client contact information from a DC-area real estate company, and then created a “business email compromise” (BEC) scam, which resulted in $1.5 million being stolen in a phishing/wire fraud scheme from a couple about to close on a home.

Apple Phishing Bait Has a Lot of Hooks

by Maharlito Aquino and Kervin Alintanahin

In general, a lot of phishing has been moving the embedded links the recipient is intended to click on from the body of the email into an attachment, in order to increase the odds of evading detection and, we theorize, as a kind of “social engineering” ploy to move the user along quickly and get them into a clicking frame of mind. During recent analysis of malicious PDF samples, we saw a lot of Apple-themed phishing content and thought it might be instructive to share how rich and varied the world of Apple phishing has become. We illustrate this with some real-world examples for you. From purchases in the app store to a range of activities using one’s Apple ID, threat actors have developed many ways to entice users to click on that malicious link that leads to the theft of precious Apple credentials.

Read more posts

25B Security Transactions Daily

1.3B Users Protected

300M Threats Blocked Daily