Skip to content
  • Solutions
    • Threat Intelligence
    • Network Solutions
      • OnNet Core
      • OnNet Plus
    • Endpoint Solutions
      • OnDevice
      • Child Protection
    • SMB Solutions
    • Case Studies
  • Resources
  • About Us
  • Contact
  • For Investors
  • Solutions
    • Threat Intelligence
    • Network Solutions
      • OnNet Core
      • OnNet Plus
    • Endpoint Solutions
      • OnDevice
      • Child Protection
    • SMB Solutions
    • Case Studies
  • Resources
  • About Us
  • Contact
  • For Investors
For Investors

Category: Resource-Post

Recognizing Today’s Phishing Threats

Think Before You Click – European Cybersecurity Awareness Month 2025

Phishing Activity Threat Report

Phishing in 2024: Emerging Tactics, Industry Impacts, and What Our Data Reveals.

Strengthening Cybersecurity Compliance

How cyan supports NIS2, DORA, and KRITIS

The Rise of DeepSeek-Related Scams

Malware and Fake Crypto Giveaways

Interview Thomas Kicker X Münchner Merkur

„Jeder ist gefährdet“

The ABC of easily reducing online risk

Navigating the Digital Landscape: Essential Tips for Online Safety

Most common forms of Phishing

Learn more about how we safeguard users form phishing

Utilizing Machine Learning

Next level website categorization

Interview Thomas Kicker X 4Investors

GERMAN Interview with the new CEO of cyan

CONTACT

cyan Security Group GmbH
ICON Tower 24
Wiedner Gürtel 13
1100 Vienna | Austria

[email protected]
+43 (1) 33 66 911-0

Get in touch!

LINKS

Jobs
Investor Relation

Want to learn more?

Contact our experts
today!

Get in touch

© cyan Security Group 2025

  • Imprint
  • Privacy Policy
  • Cookie Policy
  • Imprint
  • Privacy Policy
  • Cookie Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}