Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Empirical Security Raises $12 Million for AI-Driven Vulnerability Management

Posted on July 17, 2025July 17, 2025 By CWS

Cybersecurity startup Empirical Safety right this moment introduced rising from stealth mode with $12 million in seed funding for its AI-powered vulnerability administration platform.

The funding spherical was led by Costanoa Ventures, with extra help from DNX Ventures, Sixty Diploma Capital, HPA, and several other angel traders.

Based in 2024, Chicago-based Empirical is constructing and coaching each international and {custom} data-driven AI fashions to assist organizations safe their environments towards the exploitation of vulnerabilities.

Utilizing a corporation’s distinctive mixture of information, programs, and technical stack, Empirical creates native AI fashions tailor-made to that enterprise.

The corporate gives a twin mannequin structure, the place international fashions leverage intelligence collected from internet-scale datasets to anticipate new assaults, whereas native fashions adapt that intelligence to the shopper’s distinctive infrastructure, operations, and risk profile.

Along with the recent funding, Empirical introduced that Kenna Safety co-founder Ed Bellis is becoming a member of the corporate as its Chief Govt Officer (CEO). Empirical co-founders Michael Roytman and Jay Jacobs additionally served at Kenna, which was acquired by Cisco in 2021.

Jacobs and Roytman are among the many creators of the Exploit Prediction Scoring System (EPSS), an open supply prediction system powered by Empirical that estimates the chance {that a} software program vulnerability will probably be exploited in assaults.

“At this time’s cyberattacks are custom-built utilizing AI and your personal infrastructure towards you. Defending with generic, one-size-fits-all fashions is a begin, however solely {custom}, localized fashions – educated in your information and setting – can shut that hole,” Roytman, who serves as Empirical CTO, stated.Commercial. Scroll to proceed studying.

Associated: IoT Safety Agency Exein Raises $81 Million

Associated: Cyber Intelligence Agency iCOUNTER Emerges From Stealth With $30 Million in Funding

Associated: Zip Safety Raises $13.5 Million in Collection A Funding

Associated: Cato Networks Raises $359 Million to Develop SASE Enterprise

Security Week News Tags:AIdriven, Empirical, Management, Million, Raises, Security, Vulnerability

Post navigation

Previous Post: NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution
Next Post: Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

Related Posts

In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
New Campaigns Distribute Malware via Open Source Hacking Tools Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit Security Week News
Adidas Data Breach Linked to Third-Party Vendor Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
  • Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
  • Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News