Search company, investor...

Founded Year

2013

Stage

Acquired | Acquired

Total Raised

$47.02M

About CyberX

CyberX offers a cybersecurity platform. It offers a platform for continuously reducing industrial-internet-of-things (IIoT) and industrial control system (ICS) risk. It prevents costly production outages, safety failures, environmental incidents, and theft of sensitive intellectual property. It was founded in 2013 and is based in Waltham, Massachusets. In June 2020, CyberX was acquired by Microsoft.

Headquarters Location

203 Crescent Street Suite 107

Waltham, Massachusetts, 02453,

United States

617-209-6565

CB Insights
Looking for a leg up on competitive, customer and technology insights?
CB Insights puts confidence and clarity into your most strategic decisions.
See how. Join a demo.
Join a demo
Trusted by the world's smartest companies to:
  • Predict emerging trends
  • See competitors' playbooks
  • Stalk the smart money
  • Identify tomorrow's challengers
  • Spot growing industries
  • Kill analyst data work
Let's see how we can help you!
MicrosoftWalmartWells Fargo
You're one click away from the most comprehensive, unmatched analyst expertise in tech, in-depth private company data and a platform that brings it all together.
Click Now. Join a live demo
Join a demo

Research containing CyberX

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned CyberX in 2 CB Insights research briefs, most recently on Mar 30, 2021.

Expert Collections containing CyberX

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

CyberX is included in 3 Expert Collections, including Artificial Intelligence.

A

Artificial Intelligence

10,944 items

Companies developing artificial intelligence solutions, including cross-industry applications, industry-specific products, and AI infrastructure solutions.

C

Cybersecurity

6,868 items

These companies protect organizations from digital threats.

A

Advanced Manufacturing

4,358 items

Companies in the advanced manufacturing tech space, including companies focusing on technologies across R&D, mass production, or sustainability

CyberX Patents

CyberX has filed 6 patents.

The 3 most popular patent topics include:

  • Analog circuits
  • Computer network security
  • Computer security
patents chart

Application Date

Grant Date

Title

Related Topics

Status

7/2/2018

6/9/2020

Network protocols, Cyberwarfare, Computer security, Computer network security, Cyberattacks

Grant

Application Date

7/2/2018

Grant Date

6/9/2020

Title

Related Topics

Network protocols, Cyberwarfare, Computer security, Computer network security, Cyberattacks

Status

Grant

Latest CyberX News

A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks

May 19, 2023

Kaspersky researchers have uncovered clues that further illuminate the hackers’ activities, which appear to have begun far earlier than originally believed. Russian security firm Kaspersky today released new research that adds another piece to the puzzle of a hacker group whose operations appear to stretch back further than researchers previously realized. Research published last week from the security firm Malwarebytes shed new light on a hacking group , Red Stinger, that has been carrying out espionage operations against both pro-Ukraine victims in central Ukraine and pro-Russia victims in eastern Ukraine. The findings were intriguing because of the ideological mix of the targets and the lack of connections to other known hacking groups. A few weeks before Malwarebytes released its report, Kaspersky had also published research about the group, which it calls Bad Magic, and similarly concluded that the malware used in the attacks didn't have connections to any other known hacking tools. The research Kaspersky released today finally links the group to past activity and provides some preliminary context for understanding the attackers' possible motivations. Adding the Malwarebytes research to what they had found independently, Kaspersky researchers reviewed historic telemetry data to look for connections. Eventually, they discovered that some of the cloud infrastructure and malware the group was using had similarities to espionage campaigns in Ukraine that the security company ESET identified in 2016 , as well as campaigns the firm CyberX discovered in 2017 . “Malwarebytes found out more about the initial infection stage, and then they found more about the installer” used in some of the group's attacks since 2020, says Georgy Kucherin, a Kaspersky malware researcher. “After publishing our report about the malware, we decided to view historical data about similar campaigns that have similar targets and that have occurred in the past. That’s how we discovered the two similar campaigns from ESET and CyberX, and we concluded with medium to high confidence that the campaigns are tied together and they are all likely to be executed by the same actor.” The different activity through time has similar victimology, meaning the group focused on the same types of targets, including both officials working for pro-Russia factions within Ukraine and Ukrainian government officials, politicians, and institutions. Kucherin also notes that he and his colleagues found similarities and multiple overlaps in the code of the plugins used by the group's malware. Some code even appeared to be copied and pasted from one campaign to the next. And the researchers saw similar use of cloud storage and characteristic file formats on the files the group exported to their servers. The Malwarebytes research published last week documented five campaigns since 2020 by the hacking group, including one that targeted a member of Ukraine's military who works on Ukrainian critical infrastructure. Another campaign targeted pro-Russia election officials in eastern Ukraine, an adviser to Russia's Central Election Commission, and one who works on transportation in the region. Back in 2016, ESET wrote of the activity it called “Operation Groundbait”: “The main point that sets Operation Groundbait apart from the other attacks is that it has mostly been targeting anti-government separatists in the self-declared Donetsk and Luhansk People’s Republics. While the attackers seem to be more interested in separatists and the self-declared governments in eastern Ukrainian war zones, there have also been a large number of other targets, including, among others, Ukrainian government officials, politicians, and journalists.” Most Popular

CyberX Frequently Asked Questions (FAQ)

  • When was CyberX founded?

    CyberX was founded in 2013.

  • Where is CyberX's headquarters?

    CyberX's headquarters is located at 203 Crescent Street, Waltham.

  • What is CyberX's latest funding round?

    CyberX's latest funding round is Acquired.

  • How much did CyberX raise?

    CyberX raised a total of $47.02M.

  • Who are the investors of CyberX?

    Investors of CyberX include Microsoft, Plug and Play Accelerator, Glilot Capital Partners, Flint Capital, Norwest Venture Partners and 10 more.

  • Who are CyberX's competitors?

    Competitors of CyberX include Dragos and 2 more.

CB Insights
Looking for a leg up on competitive, customer and technology insights?
CB Insights puts confidence and clarity into your most strategic decisions.
See how. Join a demo.
Join a demo
Trusted by the world's smartest companies to:
  • Predict emerging trends
  • See competitors' playbooks
  • Stalk the smart money
  • Identify tomorrow's challengers
  • Spot growing industries
  • Kill analyst data work
Let's see how we can help you!
MicrosoftWalmartWells Fargo

Compare CyberX to Competitors

Dragos Logo
Dragos

Dragos offers industrial cybersecurity software. It develops an automation platform that provides visibility into assets, detection of threats through behavioral analytics, collection and correlation of various industrial control systems (ICS) and operational technology (OT) data sets. It was founded in 2016 and is based in Hanover, Maryland.

Claroty Logo
Claroty

Claroty provides cybersecurity solutions. The company offers solutions such as asset management, asset discovery, network protection, threat detection, and more. It serves industries such as healthcare, government, and more. The company was founded in 2015 and is based in New York, New York.

Nozomi Networks Logo
Nozomi Networks

Nozomi Networks develops an online cybersecurity platform. It provides superior operational visibility, advanced operational technology (OT), internet of things (IoT), threat detection, and more. It serves airports, building automation systems, electric utilities, healthcare, manufacturing, and mining industries. The company was founded in 2013 and is based in San Francisco, California.

ForeScout Logo
ForeScout

Forescout delivers automated cybersecurity solutions through an integrated platform. Its solutions include risk and exposure management, Internet of Things (IoT) security, asset inventory management, medical device security, and more. It serves financial services, government, healthcare, energy and utilities and education industries. The company was founded in 2000 and is based in San Jose, California.

Phosphorus Logo
Phosphorus

Phosphorus provides xTended Security of Things™ platform designed to secure the growing and unmonitored things across the enterprise xIoT landscape. Its security platform delivers attack surface management, hardening and remediation, and detection and response to enterprise, retail, finance, defense, and intelligence industries. The company was founded in 2016 and is based in Nashville, Tennessee.

V
Verve

Verve manages and designs industrial control systems. The company specializes in cybersecurity, industrial automation, NERC CIP compliance, industrial controls design, and OT cyber security. It is based in Florissant, Missouri.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Join a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.