Cybersixgill

Last updated
Cybersixgill
Company type Private
Industry IT, Software, Security
Founded2014
Founder
  • Avi Kasztan
  • Elad Lavi
Headquarters,
Website cybersixgill.com

Cybersixgill (formerly 'Sixgill') is an Israeli B2B cyber intelligence company that analyses and monitors the deep web and dark web for threat intelligence. [1] [2] The company was founded in 2014 and is headquartered in Tel Aviv, Israel. [3]

Contents

In November 2024, Cybersixgill was acquired by Bitsight, a security rating company. [4]

History

Sixgill was founded in Tel Aviv, Israel, in 2014, by Avi Kasztan and Elad Lavi. [2] The idea for Sixgill was developed by Kasztan. Soon after the company was established, it joined the Citibank accelerator program. [5]

The Sixgill platform uses algorithms and technology to create profiles and patterns of dark web users and hidden social networks. [1] It identifies and tracks potential cyber criminals to prevent malicious activity such as hacking and data breaches. [3] Customers of Sixgill include; global 2000 enterprises, financial services, managed security service providers (MSSPs), government and law enforcement agencies. [6] [7]

In 2017, Sixgill was responsible for tracking ISIS cyber activity in relation to threats made towards Prince George and the British royal family. [8] [9] In 2019, Sixgill agents uncovered the money laundering activities undertaken by cyber criminals through the Fortnite Battle Royale online game in Russian, Chinese, Arabic, English and Spanish. [10] [11] [12]

Sixgill offers autonomous threat intelligence to help organizations detect and protect against phishing, data leaks, fraud, malware and vulnerability exploitation in order to enhance cyber resilience and minimize risk exposure in real-time. The Investigative Portal provides covert access to threat intel from the deep and dark web, with context and actionable insights for remediation. Integrated into existing security systems, Darkfeed™ improves endpoint protection by preemptively blocking malicious IOCs, while CVE insights from the DVE Score™ transform vulnerability management, predicting the immediate risk of vulnerability exploitation based on threat actor intent.[ citation needed ]

Funding

In 2014, Sixgill received its initial funding of $1 million from Terra Labs. In 2016, the company raised an additional series A round of $4.3 million composed of $800,000 from Terra Labs and $3.5 million from Elron Electronic Industries. [13] [14]

In March 2022, Cybersixgill announced a $35 million Series B funding round raised from seven investors, bringing the company's total investment to $56 million. [15]

Awards and recognition

Related Research Articles

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside the development of information technology, cyberterrorism involves acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

Recorded Future, Inc. is an American privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

Cyren Inc. was a cloud-based Internet security technology company that provided security services and threat intelligence services to businesses. It offered a range of services including web security, DNS security, anti-spam solutions, phishing detection, ransomware protection, URL filtering, malware detection, and botnet attack prevention. Cyren also provided endpoint protection for mobile devices and Internet of Things (IoT) gateways. Major clients included Microsoft, Google, Check Point, Dell, T-Mobile, and Intel. The company announced its closure in February 2023.

Cyber threat intelligence (CTI) is a subfield of cybersecurity that focuses on the structured collection, analysis, and dissemination of data regarding potential or existing cyber threats. It provides organizations with the insights necessary to anticipate, prevent, and respond to cyberattacks by understanding the behavior of threat actors, their tactics, and the vulnerabilities they exploit. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.

<span class="mw-page-title-main">Illusive Networks</span>

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel and New York. The company produces technology that stops cyber attackers from moving laterally inside networks by finding and eliminating errant credentials and connections, planting deceptive information about given network's resources, emulating devices, and deploying high interactivity decoys. Network administrators are alerted when cyber attackers use security deceptions in an attempt to exploit the network. Illusive Networks is the first company launched by the Tel Aviv-based incubator, Team8. In June 2015, Illusive Networks received $5 million in Series A funding from Team8. To date, it has raised over $54M.

SafeBreach is a cybersecurity company based in Sunnyvale, California and Tel Aviv, Israel. The company has developed a platform that simulates hacker breach methods, running continuous "war games" to identify breach scenarios across network systems. SafeBreach is a pioneer in the emerging category of breach and attack simulation. The company's platform provides a “hacker's view” of an enterprise’s security posture to predict attacks, validate security controls and improve SOC analyst response. SafeBreach is funded by Sequoia Capital, Hewlett-Packard pathfinder, Deutsche Telekom Capital Partners and others.

The Lazarus Group is a hacker group made up of an unknown number of individuals, alleged to be run by the government of North Korea. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them since 2010. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra and ZINC or Diamond Sleet. According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.

ThetaRay is a fintech software and big data analytics company with headquarters in Hod HaSharon, Israel and New York, and offices in Madrid, London, and Singapore.

<span class="mw-page-title-main">Cybereason</span> American cybersecurity technology company

Cybereason is an American cybersecurity technology company founded in 2012. It is headquartered in the United States, with offices in San Diego, California Tokyo, Japan, Cork, Ireland, Dubai, UAE, and Tel Aviv, Israel.

Javelin Networks is an Israeli Artificial Intelligence (AI) and cyber security software development organization. The organization develops A.I., obfuscation and advanced forensics methodologies, and has branches in Tel Aviv and Palo Alto (California).

<span class="mw-page-title-main">Anomali</span> American cybersecurity company

Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023, the company moved into providing security analytics powered by artificial intelligence (AI).

Cynet is a cyber-security company. It converges essential cyber security technologies that help enterprises to identify security loopholes, and threat intelligence, and manage endpoint security. It was founded in 2015 in Tel-Aviv, Israel, and is headquartered in Boston, United States.

Perimeter 81 is an Israeli cloud and network security company that develops secure remote networks, based on the zero trust architecture, for organizations. Its technology replaces legacy security appliances like VPNs and firewalls.

Arctic Wolf Networks is a cybersecurity company that provides security monitoring to detect and respond to cyber threats. The company monitors on-premises computers, networks and cloud-based information assets from malicious activity such as cybercrime, ransomware, and malicious software attacks.

Candiru is a private Tel Aviv-based company founded in 2014 which provides spyware and cyber-espionage services to government clients. Its management and investors overlap significantly with that of NSO Group. Its operations began being uncovered in 2019 by researchers at CitizenLab, Kaspersky, ESET. Microsoft refers to the company's cyber-espionage operations as "Caramel Tsunami/SOURGUM" while Kaspersky refers to it as "SandCat"

<span class="mw-page-title-main">Wiz (company)</span> Cloud computing security startup

Wiz, Inc. is an American cloud security startup headquartered in New York City. The company was founded in January 2020 by Assaf Rappaport, Yinon Costica, Roy Reznik, and Ami Luttwak, all of whom previously founded Adallom. Rappaport is CEO, Costica is VP of Product, Reznik is VP of Engineering, and Luttwak is CTO. The company's platform analyzes computing infrastructure hosted in Amazon Web Services, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and Kubernetes for combinations of risk factors that could allow malicious actors to gain control of cloud resources and/or exfiltrate valuable data.

Talon Cyber Security is an Israel-based provider of cybersecurity technologies with headquarters in Tel Aviv. It develops a secure browser engineered to provide enterprise-grade security across all devices, irrespective of location, device type, or operating system.

References

  1. 1 2 O'Hear, Steve. "Sixgill claims to crawl the Dark Web to detect future cybercrime". TechCrunch. Retrieved 2018-02-01.
  2. 1 2 Weinglass, Simona (August 12, 2015). "Ex-Israeli agents want to shine a flashlight on the dark web". The Times of Israel . Retrieved 2018-02-01.
  3. 1 2 Boyer, Sam. "Cyber intelligence company trawling Dark Web to foil impending cyberattacks on clients". Insurance Business. Retrieved 2018-02-01.
  4. "Bitsight to Acquire Cyber Threat Intelligence Leader Cybersixgill to Help Enterprises to Preempt Cyber Attacks". PRNewswire. 2024-11-11. Retrieved 2024-11-14.
  5. "Israeli cyber security co Sixgill raises $5m - Globes English". Globes.
  6. "¿Iniciará Corea del Norte una guerra cibernética?". CNN (in European Spanish). 2017-11-17. Retrieved 2018-02-01.
  7. 1 2 "Sixgill's new cyber threat intelligence platform is tailored to meet the needs of MSSPs". Help Net Security. 2019-06-04. Retrieved 2019-06-28.
  8. Mackie, Thomas (30 October 2017). "'He's a CHILD!' Britain FURIOUS as ISIS 'threatens to KILL Prince George at school'".
  9. Binding, Lucia (29 October 2017). "Isis pledge sickening threat to kill Prince George at school".
  10. "How children playing Fortnite are helping to fuel organised crime". The Independent. 2019-01-13. Retrieved 2019-06-28.
  11. Crecente, Brian (2019-01-15). "Dark Web Creating 'Thriving Criminal Eco-System' Around Game". Variety. Retrieved 2019-06-28.
  12. "Epic's battle royale game Fortnite used to launder money". IT PRO. Retrieved 2019-06-28.
  13. "Israeli cyber security sartup Sixgill raises $5 million to crawl the Dark Web for cyber crime - Jewish Business News". 16 June 2016.
  14. "Israeli startups have raised $561 million in June – so far".
  15. "Cybersixgill Announces $35 Million in Series B Funding to Expand Global Footprint to Combat the Growing Cybercrime and Cyber Threat Landscape" (Press release). Tel Aviv, Israel: PRNewsire. Cybersixgill. 2022-03-10. Retrieved 2023-06-11.
  16. "Sixgill Named a "Cool Vendor" by Gartner". finance.yahoo.com. Retrieved 2019-06-28.
  17. "CNC Intelligence". cncintel.com. Retrieved 2021-06-22.
  18. "U.S. Cyber Insurance Companies". beinsure.com. Retrieved 2023-08-28.