Phishing Intelligence Feed

Protection from zero-hour phishing threats

Prevent and protect from increased phishing attacks

Phishing attacks increased by 264% in 2013 and show no signs of slowing down. Today, phishing is a critical threat to Internet users, particularly as phishing sites become more sophisticated and difficult to identify. Cyren’s daily analysis of billions of Internet transactions provides an unmatched view of phishing threats as they emerge—we are adding thousands of new phishing URLs to the feed daily, the instant we find them.

The Cyren Phishing Intelligence Feed offers:

  • Real-time Protection — Cyren Phishing Intelligence Feed enables real-time protection from emerging web threats on all devices, including smart phones and tablets, as well as a great user experience with low latency, deep coverage, and high accuracy.
  • Immediate Phishing Threat Notification — Every time a new phishing threat emerges our customers receive the information instantly.
  • Powerful Data Sources and Analytics — Cyren’s database is the largest of its kind in the world; every day, Cyren analyzes more than 17 billion internet transactions, from more than 500,000 points of presence in over 200 countries, enabling immediate and accurate identification of emerging phishing threats.
  • Continuous Protection for Users — Users are always protected against compromising their corporate and personal online accounts or downloading malicious content.

Additional resources

Report

Brochure

Cyren Phishing Feed

Download
Report

On-demand Webinar

Safe Browsing and a Great User Experience

View
Report

On-demand Webinar

Is There a Blind Spot in Your Cybercrime Vision? Add a Threat Data Feed for 20/20 Results

View

Continuous, instant protection from phishing

Cyren’s Phishing Intelligence Feed offers effective protection against hijacked websites, zero-hour phishing attacks, and fake URLs masquerading as legitimate websites.

With the Cyren Phishing Intelligence Feed you can:

  • Benefit from Cyren’s continuously updated feed of confirmed sources of phishing.
  • Significantly differentiate your organization from the competition based on the sheer volume of accurate phishing data provided instantly by Cyren.
  • Easily integrate the Cyren Phishing Intelligence Feed into existing Anti-spam or URL filtering applications.
  • Provide your users with a minimal-impact, safe browsing experience.

To ensure you and your customers are getting optimized protection, Cyren’s Phishing Intelligence Feed is offered as a stand-alone subscription to support an already-existing Anti-spam or filtering application, or as an added feature in Cyren’s embedded Anti-spam or URL filtering solutions.

What others are saying

Our customers benefit from the increased detection and blocking coverage provided by Cyren through its expansive view of global Internet traffic, its rapid detection and its broad coverage.

Christopher Young SVP , Technologies and Markets, RSA

We believe that Cyren provides not only the best value, but the best protection, available in the market, hands down. The quality of protection offered by Cyren ensures our ability to offer piece of mind to each and every one of our customers.

Mohammed Rafi, Managing Director, GMS

Powerful, patented technology enabling accurate and immediate phishing deed data

Cyren’s Phishing Intelligence Feed is powered by our GlobalView™ Cloud infrastructure and its patented Recurrent Pattern Detection™ (RPD) technology—which processes more than 17 BILLION internet transactions every day—provides both instantaneous and predicative detection to protect users and corporations from phishing sources, while ensuring no browsing disruption.

To protect users and deliver instant phishing information to customers, Cyren extracts URLs that are repeatedly seen in scanned email messages analyzed by the GlobalView™ Cloud. These URLs are processed to isolate phishing websites using sophisticated heuristic rules that include filtering out media URLs, searching for sites with multiple sub-domains, searching for known phishing keywords, applying a “fuzzy” logic detection algorithm, and verification (by human analysts) of suspected phishing URLs.

Interested in this solution?