Zombie IPs Added to IID’sThreat Intelligence ExchangeZombie IPs Added to IID’sThreat Intelligence Exchange
Intelligence around phishing threats and malicious IP addresses being used for botnets added into one of the world’s largest commercial cyberthreat data exchanges
August 27, 2015
has made its Phishing Intelligence Feed and Malicious IP Intelligence Feed available in IID’s big data solution for Internet security—ActiveTrust. By accessing CYREN data in ActiveTrust, IID clients get insight into the latest phishing threats as well as IP addresses being used for botnets—computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers. Organizations can automatically feed that intelligence into their cybersecurity appliances; ensuring cyberthreats are mitigated in a timely, efficient and effective manner.
“By gaining global intelligence at super-fast speeds, CYREN’s technology enables trusted partners such as IID to further strengthen the protection they offer their extensive customer base,” said Einat Glik, vice president and general manager, Email Security at CYREN. “We are pleased to team with IID to proactively protect against ever-evolving malicious threats.”
CYREN’s Zombie IP Feed contains a list of IP addresses that are sending spam and/or participating in other cybercrimes. The list contains anywhere from 5 to 12 million IP addresses. CYREN’s daily analysis of billions of Internet transactions provides thousands of new phishing URLs to its Phishing Intelligence Feed daily, the instant they find them. With today’s announcement, the unfettered CYREN intelligence is available in the ActiveTrust dashboard, meaning it can be input it into any organization’s cybersecurity infrastructure with no formatting via ActiveTrust as easily as IID’s own curated data.
“Approximately 500 million computers globally are infected each year and the phishing epidemic shows no signs of slowing down,” said IID President and CTO Rod Rasmussen. “Because it’s unrealistic to think we’ll completely take down these intricate cybercrime networks responsible for botnets and phishing, it’s essential organizations get the latest data on where these threats live and CYREN provides this.”
In addition to premium data like from CYREN, IID distills, analyzes and inputs the cyberthreat intelligence from thousands of sources like governance and guidance organizations, law enforcement, Internet service providers, and other Internet security experts and groups worldwide into ActiveTrust. By providing this extra layer of context, ActiveTrust makes sense of what is relevant for organizations. Dozens of Fortune 500 companies and U.S. government agencies rely on ActiveTrust data to detect and mitigate threats, making it one of the world’s largest commercial cyberthreat data exchanges.
For more information about the IID-CYREN partnership, go to internetidentity.com/partners/CYREN.
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a 20 year ICSA Service Excellence award winner in cybersecurity. Through full-function Security as a Service (SecaaS) and embedded deployment options, CYREN provides web, email, mobile and endpoint security solutions that are relied upon by the world's largest companies to protect against today's advanced threats. CYREN collects threat data and delivers real-time cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users. To learn more, visit www.cyren.com.
IID is a cybersecurity company. Its flagship product, ActiveTrust, adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into actionable intelligence delivered to security professionals and automated infrastructure. Fortune 500 companies and U.S. government agencies leverage IID to detect and mitigate threats, making ActiveTrust one of the world’s largest commercial cyberthreat data exchanges. For more, go to internetidentity.com.
© 2015 CYREN Ltd. CYREN and GlobalView are trademarks of CYREN Ltd. Other company and product names may be trademarks of their respective owners.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report