privacy-policy

Privacy Policy

Last Updated: 02/13/2025

At Cydra Intel (“we,” “us,” or “our”), we believe in putting data ownership in your hands while providing robust cybersecurity and threat intelligence services. This Privacy Policy outlines how we collect, store, use, and share information—including email and SMS submissions—when you use our platform.


Data Ownership & Confidentiality

  • User Ownership
    Any email or message (“Submission”) you send us for analysis remains your property. We never grant other users access to your Submissions.
  • Privacy by Design
    We design our systems so personal data is protected at every step, restricting access to only authorized personnel.

Information We Collect

  1. Email and SMS Submissions
    We gather the content of emails, messages, metadata, URLs, and any attachments you submit for analysis.
  2. Threat Indicators
    From these Submissions, we may extract potentially malicious artifacts (e.g., URLs, domains, file signatures, sender addresses) to enhance our threat intelligence database.
  3. User Account Data
    During sign-up, we collect basic details (e.g., email address, username) necessary to create and secure your account.

How We Use Your Data

  1. Threat Analysis
    We utilize your Submissions to detect, investigate, and mitigate cyber threats on your behalf.
  2. Threat Intelligence & Selling
    • We may sell or share aggregated, non-personal threat data (e.g., malicious URLs, IP addresses, domains) as part of our commercial offerings.
    • PII & Sensitive Information: We never sell personally identifiable information or use it for marketing unless you explicitly opt in.
  3. Service Improvements
    Aggregated or anonymized data may be used to refine our analysis tools, algorithms, and overall user experience.

Marketing & Communications

  • Opt-In Policy
    We do not use your personal information for ads or marketing unless you choose to opt in.
  • Optional Updates
    If you subscribe to updates, you can unsubscribe at any time.

Data Retention

  • Long-Term Storage
    We retain all Submissions indefinitely for ongoing cybersecurity research, historical trend analysis, and threat intelligence purposes—even if you close your account or request deletion.
  • Security Measures
    Your data is stored in secure environments, protected with encryption, and accessible only to authorized team members.

Data Security

  1. Encryption in Transit & At Rest
    We safeguard your data with industry-standard encryption protocols.
  2. Limited Access
    Only employees and contractors with a valid business purpose can access your data, subject to strict confidentiality agreements.
  3. Monitoring & Auditing
    We regularly monitor our systems and conduct audits to maintain robust security standards.

Data Sharing

  • Internal Teams
    Our in-house threat analysis team processes your Submissions for research and intelligence generation.
  • Anonymized Threat Intelligence
    We may share or sell de-identified or aggregated threat indicators (e.g., malicious URLs, IP addresses) with partners, researchers, or clients.
  • Legal Requirements
    We may disclose information if lawfully required (e.g., in response to a subpoena or court order), but only after confirming the request’s validity.

Your Rights & Choices

  1. Access
    You can request a summary of your personal data that we have on file.
  2. Account Closure
    Although you may close your account at any time, your Submissions will not be deleted from our systems, as they are integral to our ongoing threat intelligence research.
  3. Opt-Out
    You can opt out of marketing communications by adjusting your preferences in your account settings or by contacting us directly.

Changes to This Policy

We may revise this Privacy Policy as our services evolve. Any significant changes will be posted on our website along with a new effective date. We encourage you to review this page periodically to stay informed about our practices.


Contact Us

For any questions about this Privacy Policy, your personal data, or our data practices, please get in touch:

By using our platform, you acknowledge that you’ve read and understood this Privacy Policy and agree to its terms. We remain dedicated to protecting your data and maintaining transparency in all our processes.