Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cyata Emerges From Stealth With $8.5 Million in Funding

Posted on July 30, 2025July 30, 2025 By CWS

Cybersecurity startup Cyata as we speak emerged from stealth mode with a platform that tackles the chance of AI brokers gaining unrestricted entry to enterprise environments.

Amid broad adoption of AI brokers to spice up productiveness, the Tel Aviv-based firm seeks to handle a safety hole and ship governance, oversight, and id administration for these brokers.

Cyata’s platform identifies, displays, and controls AI brokers working throughout enterprise environments outdoors conventional id and entry administration frameworks.

The corporate’s resolution repeatedly scans desktop and SaaS environments for AI identities and their permissions, and creates detailed audit trails of their exercise, together with by requiring them to justify reasoning in actual time.

Overlaying AI copilots, chatbots, and task-driven brokers, Cyata additionally enforces granular entry controls for these digital identities, sustaining human-in-the-loop approvals for delicate operations.

The corporate launched as we speak with $8.5 million in a seed funding spherical led by TLV Companions, with extra help from a number of angel buyers.

Cyata was based by trade veterans Shahar Tal (CEO), Dror Roth (VP R&D), and Baruch Weizman (CTO), who held main roles at Cellebrite, Verify Level, and Israel’s cyberwarfare unit 8200, and has a group of 12 cybersecurity professionals in Tel Aviv, over half of them coming from Cellebrite.

“AI brokers symbolize the most important leap in enterprise know-how for the reason that cloud – a self-scaling, sleepless workforce that codes, analyzes, and executes in seconds,” Cyata CEO and co-founder Shahar Tal mentioned.Commercial. Scroll to proceed studying.

“We give attention to the actors, not the LLMs – as a result of brokers, not fashions, are those making choices and triggering threat. Cyata provides safety groups identity-grade controls constructed particularly for AI brokers, to allow them to unlock their energy – with out shedding management,” Tal added.

Associated: Tonic Safety Launches With $7 Million in Seed Funding

Associated: Axonius Acquires Medical Machine Safety Agency Cynerio in $100 Million Deal

Associated: From Tech Podcasts to Coverage: Trump’s New AI Plan Leans Closely on Silicon Valley Trade Concepts

Associated: Cloud Backup Firm Rewind Raises $65 Million

Security Week News Tags:Cyata, Emerges, Funding, Million, Stealth

Post navigation

Previous Post: Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered
Next Post: Telecom Giant Orange Hit by Cyberattack

Related Posts

React Native Aria Packages Backdoored in Supply Chain Attack Security Week News
Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News
TrustCloud Raises $15 Million for Security Assurance Platform Security Week News
Minnesota Activates National Guard in Response to Cyberattack Security Week News
Zscaler to Acquire MDR Specialist Red Canary Security Week News
Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News