Speedy, scalable malware analysis

Faster than existing solutions, Cyren Hybrid Analyzer improves detection of zero-hour malware without compromising performance or privacy.

Cyren has introduced the Cyren Hybrid Analyzer, a new offering that produces detailed analysis and risk ratings of files without the cost, speed, and scalability constraints of sandboxes and other malware file analysis technologies. The new solution enables service providers, technology companies, and large enterprises to lower the risk of undetected malware.

New, undetected malware represents upwards of 10% of files but it presents almost all the risk of infection. Cyren Hybrid Analyzer closes the gap between anti-malware detection and sandbox detonation by producing relevant analysis of file structure and behaviors quickly and at high volumes. Using emulation - effectively automatically reverse engineering the code contained in a file - this new offering from Cyren operates 100 times faster than a malware sandbox and 5 to 20 times faster than alternative file analysis solutions.

"We process millions of files each day for a global customer base. The ability to analyze files at scale will allow us to respond much faster to suspicious email attachments and provide security policies tailored to each customer's needs," said Arron Caruth, Vice President of Product Development at MDaemon Technologies, a pioneer in email and email security software. "Cyren's technology enables us to move beyond existing solutions that only rely on file reputation databases and malware sandboxes which are not intelligent enough and too slow for an everchanging email threat landscape," Caruth added.

"Hybrid Analyzer is a creation of our own need to analyze millions of suspicious files each day," said Isaac Dvir, Cyren's Senior Vice President of Engineering. "We recognized that other businesses also need this intelligence to protect their customers and employees. Afterall, it is the undetected malware that presents all the risk of infection."

Every day, businesses get infected by novel malware variants and techniques that avoid detection by even the best anti-malware solutions. For organizations protecting massive networks, the volume of suspicious files that require closer inspection for possible undetected malware threats is too large to handle with existing file analysis tools. Hybrid Analyzer provides real-time risk scoring of files to optimizes defenses against undetected malware threats.

Customers can apply Cyren Hybrid Analyzer to:

Enforce smarter email security policies by analyzing file attachments for suspicious traits and behaviors

Reduce or eliminate the time and costs of malware sandbox analysis and decrease Mean Time to Detect new malware threats

Feature extraction at scale to train and improve machine learning models used for detecting unknown malware and suspicious files

94% of CIOs say extending a DevSecOps culture to more teams is key to accelerating digital transformation and driving faster, more secure software releases.
22% of senior technology decision-makers in the UK identified cybersecurity solutions as the most important factor affecting business transformation.
New product enables organizations to increase observability, consistency and control of machine identities across complex Kubernetes environments.
Civo has published new research, finding that 53% of developers are concerned about the security of Kubernetes.
According to Canalys’ latest cybersecurity forecasts, global cybersecurity spending (including enterprise products and services) will increase by 13.2% in 2023 and remain a key growth sector for channel partners.
Integrated Ivanti/Lookout solution provides organizations with end-to-end visibility and control over their mobile devices and cloud services, reducing the risk of a security breach.
The new capability provides timely insights into risky user data access behaviour for enhanced cloud data security posture and risk management.
The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing the trend that was observed in the first half of 2022, Nozomi Networks Labs researchers saw hacktivists shift tactics from data theft and Distributed Denial of Service (DDoS) attacks to utilizing more destructive malware in an attempt to destabilize critical infrastructure to further their political stance in the Russia/Ukraine war.