Search company, investor...

Founded Year



Valuation Change | Alive

Total Raised




About Cybereason

Cybereason develops software to help track the actions of cyber attackers. Its automated platform collects clues by learning to discern anomalies and analyzes the data using algorithms. The company was founded in 2012 and is based in Boston, Massachusetts.

Headquarters Location

200 Berkeley Street

Boston, Massachusetts, 02116,

United States



Cybereason's Product Videos

Product Demo.png

ESPs containing Cybereason

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Enterprise Tech / Networking

The extended detection & response (XDR) market offers advanced cybersecurity solutions that provide comprehensive visibility, detection, and response capabilities against cyber threats. XDR refers to a holistic approach to cybersecurity that integrates multiple security technologies and data sources into a unified platform. These solutions leverage advanced analytics, machine learning, and artific…

Cybereason named as Leader among 10 other companies, including Sophos, Tehtris, and Galvanick.

Cybereason's Products & Differentiators

    Cybereason XDR

    Cybereason XDR, powered by Google Cloud, automates prevention, detection and response for complex cyberattacks as it guides analysts through security operations and incident response, enabling proactive threat hunting with precision at a pace never before achieved:


Research containing Cybereason

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Cybereason in 5 CB Insights research briefs, most recently on Nov 21, 2023.

Expert Collections containing Cybereason

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Cybereason is included in 6 Expert Collections, including AI 100.


AI 100

99 items

Winners of CB Insights' annual AI 100, a list of the 100 most promising AI startups in the world.


Artificial Intelligence

10,987 items

Companies developing artificial intelligence solutions, including cross-industry applications, industry-specific products, and AI infrastructure solutions.


Tech IPO Pipeline

282 items

Track and capture company information and workflow.


Conference Exhibitors

5,302 items



7,614 items

These companies protect organizations from digital threats.


Targeted Marketing Tech

206 items

Cybereason Patents

Cybereason has filed 26 patents.

The 3 most popular patent topics include:

  • computer security
  • computer network security
  • cyberwarfare
patents chart

Application Date

Grant Date


Related Topics




Machine learning, Malware, Natural language processing, Classification algorithms, Figure skating elements


Application Date


Grant Date



Related Topics

Machine learning, Malware, Natural language processing, Classification algorithms, Figure skating elements



Latest Cybereason News

DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software

Nov 29, 2023

Nov 29, 2023NewsroomRansomware / Cyber Threat A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. "While this attack pattern is not new, incidents involving a DJVU variant that appends the .xaro extension to affected files and demanding ransom for a decryptor have been observed infecting systems alongside a host of various commodity loaders and infostealers," Cybereason security researcher Ralph Villanueva said . The new variant has been codenamed Xaro by the American cybersecurity firm. DJVU, in itself a variant of the STOP ransomware , typically arrives on the scene masquerading as legitimate services or applications. It's also delivered as a payload of SmokeLoader . A significant aspect of DJVU attacks is the deployment of additional malware, such as information stealers (e.g., RedLine Stealer and Vidar), making them more damaging in nature. In the latest attack chain documented by Cybereason, Xaro is propagated as an archive file from a dubious source that masquerades as a site offering legitimate freeware. Opening the archive file leads to the execution of a supposed installer binary for a PDF writing software called CutePDF that, in reality, is a pay-per-install malware downloader service known as PrivateLoader . PrivateLoader, for its part, establishes contact with a command-and-control (C2) server to fetch a wide range of stealer and loader malware families like RedLine Stealer, Vidar, Lumma Stealer, Amadey, SmokeLoader, Nymaim, GCleaner, XMRig, and Fabookie, in addition to dropping Xaro. "This shotgun-approach to the download and execution of commodity malware is commonly observed in PrivateLoader infections originating from suspicious freeware or cracked software sites," Villanueva explained. The goal appears to be to gather and exfiltrate sensitive information for double extortion as well as ensure the success of the attack even if one of the payloads gets blocked by security software. Xaro, besides spawning an instance of the Vidar infostealer, is capable of encrypting files in the infected host, before dropping a ransom note, urging the victim to get in touch with the threat actor to pay $980 for the private key and the decryptor tool, a price that drops by 50% to $490 if approached within 72 hours. If anything, the activity illustrates the risks involved with downloading freeware from untrusted sources. Last month, Sucuri detailed another campaign called FakeUpdateRU wherein visitors to compromised websites are served bogus browser update notices to deliver RedLine Stealer. "Threat actors are known to favor freeware masquerading as a way to covertly deploy malicious code," Villanueva said. "The speed and breadth of impact on infected machines should be carefully understood by enterprise networks looking to defend themselves and their data." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    

Cybereason Frequently Asked Questions (FAQ)

  • When was Cybereason founded?

    Cybereason was founded in 2012.

  • Where is Cybereason's headquarters?

    Cybereason's headquarters is located at 200 Berkeley Street, Boston.

  • What is Cybereason's latest funding round?

    Cybereason's latest funding round is Valuation Change.

  • How much did Cybereason raise?

    Cybereason raised a total of $813.62M.

  • Who are the investors of Cybereason?

    Investors of Cybereason include SoftBank, Google Cloud Platform, Irving Investors, Liberty Strategic Capital, Neuberger Berman and 6 more.

  • Who are Cybereason's competitors?

    Competitors of Cybereason include BlueVoyant, Absolute Software, Recorded Future, Source Defense, Anxinsec and 7 more.

  • What products does Cybereason offer?

    Cybereason's products include Cybereason XDR and 3 more.


Compare Cybereason to Competitors

GoSecure Logo

GoSecure delivers managed detection and response (MDR) cybersecurity and expert advisory services. GoSecure Titan managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Detection & Response offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. The company was formerly known as CounterTrack and rebranded after its acquisition of GoSecure in June 2018. GoSecure was founded in 2002 and is based in San Diego, California.

Tanium Logo

Tanium provides enterprises and government organizations to secure, control, and manage endpoints across the enterprise. The company offers asset discovery and inventory, risk and compliance management, endpoint management, investigation and remediation, and more. It provides its services to the federal government, state and local government education, financial services, retail, healthcare, and other sectors. The company was founded in 2007 and is based in Kirkland, Washington.

Deep Instinct Logo
Deep Instinct

Deep Instinct is a cybersecurity company that provides a deep learning platform to prevent enterprises from threats. Its solution reduces detection noise and false alert storms to reduce overall risk, improve SOC team productivity, and improve the cost of ownership of its customer cybersecurity stack. The company was founded in 2015 and is based in Tel Aviv, Israel.

Source Defense Logo
Source Defense

Source Defense provides real-time protection to online websites from attacks originating from third-party scripts. It uses a real-time sandbox isolation technology to provide a client-side website security solution focused on preventing malicious activity originating from website supply chain vendors. The company was founded in 2014 and is based in Rosh-Ha’ayin, Israel.

BlueVoyant Logo

BlueVoyant offers a cyber security platform. It combines internal and external cyber defense capabilities into an outcomes-based cloud-native platform by monitoring networks, endpoints, attack surfaces, and supply chains, as well as the web for threats. The company was formerly known as BlueteamGlobal. It was founded in 2017 and is based in New York, New York.


CyCraft is an AI company that operates in the cybersecurity industry, focusing on the development of autonomous systems and fostering human-AI collaboration. The company offers a range of services including managed detection and response, incident response, compromise assessment, and risk intelligence, all aimed at enhancing cybersecurity resilience. CyCraft primarily serves sectors such as financial institutions, government agencies, and high-tech manufacturing. It was founded in 2017 and is based in New Taipei City, Taiwan.


CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.