Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

CyCognito Snags $100M Investment for Attack Surface Management

The surge in venture capital bets on startups in the nascent attack surface management business continued apace Wednesday with Israeli risk management firm CyCognito announcing a new $100 million funding round.

The surge in venture capital bets on startups in the nascent attack surface management business continued apace Wednesday with Israeli risk management firm CyCognito announcing a new $100 million funding round.

CyCognito, which maintains headquarters in Tel Aviv and offices in Silicon Valley, has raised a total of $153 million since launching three years ago with a platform to help businesses manage attack surfaces on a continuous basis.

The new $100 million Series C round was led by the Westly Group and included money from new investors Thomvest Ventures and The Heritage Group.   The company said its earliest backers — Accel, Lightspeed Venture Partners, Sorenson Ventures and UpWest — also joined the round.

CyCognito sells a platform that let’s security teams identify attack surfaces, discover attack vectors, monitor risks associated with subsidiaries, and validate an organization’s security posture.

[ READ: Death of the Manual Pen-Test: Blind Spots, Limited Visibility ]

The company’s automated platform scours the Internet to collect data and combines it with machine learning to map Internet-exposed assets, determine their business context and detect attack vectors.

CyCognito said it has found success with the platform among large enterprises, noting that Fortune 500 companies like Colgate-Palmolive, Tesco and Scientific Games Corporation are among customers getting full visibility and context into risk to preempt potential attacks

The company says defenders can use its technology to autonomously build a graph data model that represents an organization’s business structure — from company name, to departments, subsidiaries, acquisitions and brands an organization owns. The platform then scans billions of servers and devices across the Internet to contextualize and identify internet-exposed and unmanaged assets that could serve as entry points for attackers.

Related: Risk Assessment Company CyCognito Raises $30 Million

Related: Bit Discovery Banks $4 Million for Attack Surface Management Tech

Related: The Rise of Continuous Attack Surface Management 

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.