Search company, investor...

Founded Year

2012

Stage

Valuation Change | Alive

Total Raised

$813.62M

Revenue

$0000 

About Cybereason

Cybereason develops software to help track the actions of cyber attackers. Its automated platform collects clues by learning to discern anomalies and analyzes the data using algorithms. The company was founded in 2012 and is based in Boston, Massachusetts.

Headquarters Location

200 Berkeley Street

Boston, Massachusetts, 02116,

United States

855-695-8200

Loading...

Cybereason's Product Videos

Product Demo.png

ESPs containing Cybereason

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTH ➡MARKET STRENGTH ➡LEADERHIGHFLIEROUTPERFORMERCHALLENGER
Enterprise Tech / Cybersecurity

The managed detection and response (MDR) market is an service-oriented approach to cybersecurity that focuses on proactively detecting and responding to advanced cyber threats and attacks. MDR providers offer continuous monitoring, analysis, and threat hunting capabilities, using a combination of technology, expertise, and threat intelligence. This service is designed to complement an organization…

Cybereason named as Leader among 15 other companies, including Arctic Wolf Networks, BlueVoyant, and Malwarebytes.

Cybereason's Products & Differentiators

    Cybereason XDR

    Cybereason XDR, powered by Google Cloud, automates prevention, detection and response for complex cyberattacks as it guides analysts through security operations and incident response, enabling proactive threat hunting with precision at a pace never before achieved:

Loading...

Research containing Cybereason

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Cybereason in 5 CB Insights research briefs, most recently on Nov 21, 2023.

Expert Collections containing Cybereason

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Cybereason is included in 6 Expert Collections, including AI 100.

A

AI 100

99 items

Winners of CB Insights' annual AI 100, a list of the 100 most promising AI startups in the world.

A

Artificial Intelligence

10,958 items

Companies developing artificial intelligence solutions, including cross-industry applications, industry-specific products, and AI infrastructure solutions.

T

Tech IPO Pipeline

282 items

Track and capture company information and workflow.

C

Conference Exhibitors

5,302 items

C

Cybersecurity

7,614 items

These companies protect organizations from digital threats.

T

Targeted Marketing Tech

206 items

Cybereason Patents

Cybereason has filed 26 patents.

The 3 most popular patent topics include:

  • computer security
  • computer network security
  • cyberwarfare
patents chart

Application Date

Grant Date

Title

Related Topics

Status

10/7/2020

10/3/2023

Machine learning, Malware, Natural language processing, Classification algorithms, Figure skating elements

Grant

Application Date

10/7/2020

Grant Date

10/3/2023

Title

Related Topics

Machine learning, Malware, Natural language processing, Classification algorithms, Figure skating elements

Status

Grant

Latest Cybereason News

DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software

Nov 29, 2023

Nov 29, 2023NewsroomRansomware / Cyber Threat A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. "While this attack pattern is not new, incidents involving a DJVU variant that appends the .xaro extension to affected files and demanding ransom for a decryptor have been observed infecting systems alongside a host of various commodity loaders and infostealers," Cybereason security researcher Ralph Villanueva said . The new variant has been codenamed Xaro by the American cybersecurity firm. DJVU, in itself a variant of the STOP ransomware , typically arrives on the scene masquerading as legitimate services or applications. It's also delivered as a payload of SmokeLoader . A significant aspect of DJVU attacks is the deployment of additional malware, such as information stealers (e.g., RedLine Stealer and Vidar), making them more damaging in nature. In the latest attack chain documented by Cybereason, Xaro is propagated as an archive file from a dubious source that masquerades as a site offering legitimate freeware. Opening the archive file leads to the execution of a supposed installer binary for a PDF writing software called CutePDF that, in reality, is a pay-per-install malware downloader service known as PrivateLoader . PrivateLoader, for its part, establishes contact with a command-and-control (C2) server to fetch a wide range of stealer and loader malware families like RedLine Stealer, Vidar, Lumma Stealer, Amadey, SmokeLoader, Nymaim, GCleaner, XMRig, and Fabookie, in addition to dropping Xaro. "This shotgun-approach to the download and execution of commodity malware is commonly observed in PrivateLoader infections originating from suspicious freeware or cracked software sites," Villanueva explained. The goal appears to be to gather and exfiltrate sensitive information for double extortion as well as ensure the success of the attack even if one of the payloads gets blocked by security software. Xaro, besides spawning an instance of the Vidar infostealer, is capable of encrypting files in the infected host, before dropping a ransom note, urging the victim to get in touch with the threat actor to pay $980 for the private key and the decryptor tool, a price that drops by 50% to $490 if approached within 72 hours. If anything, the activity illustrates the risks involved with downloading freeware from untrusted sources. Last month, Sucuri detailed another campaign called FakeUpdateRU wherein visitors to compromised websites are served bogus browser update notices to deliver RedLine Stealer. "Threat actors are known to favor freeware masquerading as a way to covertly deploy malicious code," Villanueva said. "The speed and breadth of impact on infected machines should be carefully understood by enterprise networks looking to defend themselves and their data." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    

Cybereason Frequently Asked Questions (FAQ)

  • When was Cybereason founded?

    Cybereason was founded in 2012.

  • Where is Cybereason's headquarters?

    Cybereason's headquarters is located at 200 Berkeley Street, Boston.

  • What is Cybereason's latest funding round?

    Cybereason's latest funding round is Valuation Change.

  • How much did Cybereason raise?

    Cybereason raised a total of $813.62M.

  • Who are the investors of Cybereason?

    Investors of Cybereason include SoftBank, Google Cloud Platform, Neuberger Berman, Irving Investors, Liberty Strategic Capital and 6 more.

  • Who are Cybereason's competitors?

    Competitors of Cybereason include Absolute Software, BlueVoyant, Recorded Future, Source Defense, Anxinsec and 7 more.

  • What products does Cybereason offer?

    Cybereason's products include Cybereason XDR and 3 more.

Loading...

Compare Cybereason to Competitors

GoSecure Logo
GoSecure

GoSecure delivers managed detection and response (MDR) cybersecurity and expert advisory services. GoSecure Titan managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Detection & Response offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. The company was formerly known as CounterTrack and rebranded after its acquisition of GoSecure in June 2018. GoSecure was founded in 2002 and is based in San Diego, California.

Tanium Logo
Tanium

Tanium provides enterprises and government organizations to secure, control, and manage endpoints across the enterprise. The company offers asset discovery and inventory, risk and compliance management, endpoint management, investigation and remediation, and more. It provides its services to the federal government, state and local government education, financial services, retail, healthcare, and other sectors. The company was founded in 2007 and is based in Kirkland, Washington.

Source Defense Logo
Source Defense

Source Defense provides real-time protection to online websites from attacks originating from third-party scripts. It uses a real-time sandbox isolation technology to provide a client-side website security solution focused on preventing malicious activity originating from website supply chain vendors. The company was founded in 2014 and is based in Rosh-Ha’ayin, Israel.

BlueVoyant Logo
BlueVoyant

BlueVoyant offers a cyber security platform. It combines internal and external cyber defense capabilities into an outcomes-based cloud-native platform by monitoring networks, endpoints, attack surfaces, and supply chains, as well as the web for threats. The company was formerly known as BlueteamGlobal. The company was founded in 2017 and is based in New York, New York.

Deep Instinct Logo
Deep Instinct

Deep Instinct is a cybersecurity company that provides a deep learning platform to prevent enterprises from threats. Its solution reduces detection noise and false alert storms to reduce overall risk, improve SOC team productivity, and improve the cost of ownership of its customer cybersecurity stack. The company was founded in 2015 and is based in Tel Aviv, Israel.

Bitdefender Logo
Bitdefender

Bitdefender is a company that focuses on cybersecurity, operating within the software industry. The company offers a range of products that provide threat prevention, detection, and response solutions, including device security, VPN, password management, and identity theft protection. Bitdefender primarily serves the cybersecurity industry. It was founded in 2001 and is based in Bucharest, Romania.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.