Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Email Protection Startup StrongestLayer Emerges From Stealth Mode

Posted on July 18, 2025July 18, 2025 By CWS

Electronic mail safety and human danger options supplier StrongestLayer on Thursday emerged from stealth mode with $5.2 million in seed funding.

StrongestLayer’s seed funding spherical was led by Sorenson Capital, with extra help from Recall Capital.

Based in 2024, the San Francisco-based startup has constructed TRACE (Menace Reasoning AI Correlation Engine), an LLM-native cybersecurity platform to assist organizations cease email-based assaults that evade conventional defenses.

Counting on superior reasoning and intent evaluation, the platform tackles fashionable risk actor ways, which embrace using AI to create refined, personalised spear-phishing messages.

The corporate’s predictive marketing campaign detection identifies and neutralizes phishing websites inside days after their creation, and has already detected 3.9 million pretend firm web sites.

Based on StrongestLayer, its answer can determine malicious communication no matter its wording or weaponization, and can even practice staff on easy methods to higher determine and report suspicious messages.

Constructed by trade veterans Muhammad Rizwan, Joshua Bass, and Alan LeFort, the platform can stop AI-driven and complicated assaults, together with phishing, BEC, focused impersonation, and polymorphic malware and malicious attachments.

“When refined threats that after required nation-state capabilities can now be created by anybody with AI instruments, pattern-matching methods don’t simply change into ineffective—they change into out of date. Our LLM-native strategy isn’t simply catching at the moment’s threats—it’s architected for the AI-orchestrated risk panorama that’s right here and rising,” StrongestLayer CEO and co-founder Alan LeFort mentioned.Commercial. Scroll to proceed studying.

Associated: Cyber Intelligence Agency iCOUNTER Emerges From Stealth With $30 Million in Funding

Associated: Empirical Safety Raises $12 Million for AI-Pushed Vulnerability Administration

Associated: Moral Zero Day Market Desired Impact Emerges From Stealth

Associated: QuamCore Emerges From Stealth With $9 Million to Construct a Quantum Pc

Security Week News Tags:Email, Emerges, Mode, Protection, Startup, Stealth, StrongestLayer

Post navigation

Previous Post: Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins
Next Post: Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Related Posts

Ingram Micro Scrambling to Restore Systems After Ransomware Attack Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Russian Government Hackers Caught Buying Passwords from Cybercriminals Security Week News
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
Law Firms Warned of Silent Ransom Group Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent Social Engineering Attacks
  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent Social Engineering Attacks
  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News