Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Email Protection Startup StrongestLayer Emerges From Stealth Mode

Posted on July 18, 2025July 18, 2025 By CWS

Electronic mail safety and human danger options supplier StrongestLayer on Thursday emerged from stealth mode with $5.2 million in seed funding.

StrongestLayer’s seed funding spherical was led by Sorenson Capital, with extra help from Recall Capital.

Based in 2024, the San Francisco-based startup has constructed TRACE (Menace Reasoning AI Correlation Engine), an LLM-native cybersecurity platform to assist organizations cease email-based assaults that evade conventional defenses.

Counting on superior reasoning and intent evaluation, the platform tackles fashionable risk actor ways, which embrace using AI to create refined, personalised spear-phishing messages.

The corporate’s predictive marketing campaign detection identifies and neutralizes phishing websites inside days after their creation, and has already detected 3.9 million pretend firm web sites.

Based on StrongestLayer, its answer can determine malicious communication no matter its wording or weaponization, and can even practice staff on easy methods to higher determine and report suspicious messages.

Constructed by trade veterans Muhammad Rizwan, Joshua Bass, and Alan LeFort, the platform can stop AI-driven and complicated assaults, together with phishing, BEC, focused impersonation, and polymorphic malware and malicious attachments.

“When refined threats that after required nation-state capabilities can now be created by anybody with AI instruments, pattern-matching methods don’t simply change into ineffective—they change into out of date. Our LLM-native strategy isn’t simply catching at the moment’s threats—it’s architected for the AI-orchestrated risk panorama that’s right here and rising,” StrongestLayer CEO and co-founder Alan LeFort mentioned.Commercial. Scroll to proceed studying.

Associated: Cyber Intelligence Agency iCOUNTER Emerges From Stealth With $30 Million in Funding

Associated: Empirical Safety Raises $12 Million for AI-Pushed Vulnerability Administration

Associated: Moral Zero Day Market Desired Impact Emerges From Stealth

Associated: QuamCore Emerges From Stealth With $9 Million to Construct a Quantum Pc

Security Week News Tags:Email, Emerges, Mode, Protection, Startup, Stealth, StrongestLayer

Post navigation

Previous Post: Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins
Next Post: Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Related Posts

Google Offers Up to $20,000 in New AI Bug Bounty Program Security Week News
Salesforce AI Hack Enabled CRM Data Theft Security Week News
Cybersecurity M&A Roundup: 44 Deals Announced in July 2025 Security Week News
Clorox Sues Cognizant for $380 Million Over 2023 Hack Security Week News
Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Security Week News
New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News