Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Email Protection Startup StrongestLayer Emerges From Stealth Mode

Posted on July 18, 2025July 18, 2025 By CWS

Electronic mail safety and human danger options supplier StrongestLayer on Thursday emerged from stealth mode with $5.2 million in seed funding.

StrongestLayer’s seed funding spherical was led by Sorenson Capital, with extra help from Recall Capital.

Based in 2024, the San Francisco-based startup has constructed TRACE (Menace Reasoning AI Correlation Engine), an LLM-native cybersecurity platform to assist organizations cease email-based assaults that evade conventional defenses.

Counting on superior reasoning and intent evaluation, the platform tackles fashionable risk actor ways, which embrace using AI to create refined, personalised spear-phishing messages.

The corporate’s predictive marketing campaign detection identifies and neutralizes phishing websites inside days after their creation, and has already detected 3.9 million pretend firm web sites.

Based on StrongestLayer, its answer can determine malicious communication no matter its wording or weaponization, and can even practice staff on easy methods to higher determine and report suspicious messages.

Constructed by trade veterans Muhammad Rizwan, Joshua Bass, and Alan LeFort, the platform can stop AI-driven and complicated assaults, together with phishing, BEC, focused impersonation, and polymorphic malware and malicious attachments.

“When refined threats that after required nation-state capabilities can now be created by anybody with AI instruments, pattern-matching methods don’t simply change into ineffective—they change into out of date. Our LLM-native strategy isn’t simply catching at the moment’s threats—it’s architected for the AI-orchestrated risk panorama that’s right here and rising,” StrongestLayer CEO and co-founder Alan LeFort mentioned.Commercial. Scroll to proceed studying.

Associated: Cyber Intelligence Agency iCOUNTER Emerges From Stealth With $30 Million in Funding

Associated: Empirical Safety Raises $12 Million for AI-Pushed Vulnerability Administration

Associated: Moral Zero Day Market Desired Impact Emerges From Stealth

Associated: QuamCore Emerges From Stealth With $9 Million to Construct a Quantum Pc

Security Week News Tags:Email, Emerges, Mode, Protection, Startup, Stealth, StrongestLayer

Post navigation

Previous Post: Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins
Next Post: Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Related Posts

Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News
TeamFiltration Abused in Entra ID Account Takeover Campaign Security Week News
In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News