Connect with us

Hi, what are you looking for?



CyberX Launches Industrial Threat Intelligence Initiative

Industrial cybersecurity startup CyberX has launched its Industrial Threat Intelligence Platform, which the company says can help utilities identify cyber security threats in operational networks.

Industrial cybersecurity startup CyberX has launched its Industrial Threat Intelligence Platform, which the company says can help utilities identify cyber security threats in operational networks.

The initiative is led by a team of researchers who analyze data sourced from the monitoring of operational networks, forensics and other research.

“The importance of this collaborative effort is to facilitate the adoption of the industrial Internet,” said Nir Giller, CTO at CyberX. “The data we follow and analyze combined with the cooperation from our customers and partners, enables us to provide new insights and more importantly, reveal new vulnerabilities and threats.”

CyberX says its Industrial Threat Intelligence team has already been working with numerous companies on threat mitigation and implementation of security measures, such as removing threats imposed by vulnerabilities related to Human-Machine-Interface (HMI) in ICS networks.

“Every organization with an industrial network must understand the consequences of a breach,” Giller said. “The damage can be much more than financial, it can lead to catastrophic results. We work closely with several utilities and enterprises and currently collaborative efforts are made in order to mitigate the threats that were discovered.”

CyberX says that its intelligence initiative will offer insights into both malicious and operational nature to help protect industrial networks, and disclose vulnerabilities they discover to both ICS CERT and the relevant affected vendors.

Founded in 2013 by Omer Schneider and Nir Giller, both veterans of the Israeli Defense Force (IDF) Elite Cyber Security Unit, CyberX is backed by Glilot Capital, Swarth Group and GlenRock Israel. The company announced a $2 million funding round in June 2014, and has also received support from Palo Alto, California-based accelerator UpWest Labs.  

Advertisement. Scroll to continue reading.

Related: Learn More at the ICS Cyber Security Conference

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).