Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Redefining Productivity: Why AI Should Replace Workflows

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru

February 22, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Malanta Launches with $10M Seed Funding
Cybercrime and Ransomware

Malanta Launches with $10M Seed Funding

Staff WriterBy Staff WriterNovember 5, 2025No Comments4 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. Malanta, a Tel Aviv cybersecurity startup, aims to prevent attacks by detecting indicators of pre-attack infrastructure, enabling proactive defense rather than reactive response.
  2. The company raised $10 million in seed funding to enhance its technology that analyzes digital footprints left by attackers to forecast and block malicious activities before they occur.
  3. Malanta’s platform maps and analyzes digital assets early in attack preparation, working with registrars and services to takedown malicious domains and defend clients proactively, often weeks or months ahead of potential attacks.
  4. Leveraging AI to automate detection and disruption at internet scale, Malanta maintains that its autonomous, AI-driven approach allows it to stay ahead of increasingly AI-assisted attackers.

The Issue

Malanta, a cybersecurity startup based in Tel Aviv, has developed an innovative platform designed to shift the focus of threat detection from responding to breaches to preventing them altogether. After securing $10 million in seed funding led by Cardumen Capital and supported by notable angel investors like CyberArk’s Udi Mokady, Malanta is leveraging artificial intelligence to monitor and analyze digital breadcrumbs left by attackers during their pre-attack setup phase. This enables the company to identify indicators of pre-attack infrastructure—such as malicious domains, servers, and social accounts—weeks before these are weaponized in actual campaigns. Malanta’s unique approach involves mapping and analyzing an organization’s digital assets to determine imminent threats, and actively working with domain registrars and safe browsing services to dismantle malicious infrastructure prior to attack execution. By automating unknown asset discovery and utilizing AI at machine speed, Malanta aims to stay ahead of increasingly AI-assisted attackers, offering its clients not just warnings, but proactive defense measures to neutralize threats early, thus transforming the landscape of cybersecurity from reactive to preventative.

Founded in July 2024 by former CyberArk employees, Malanta’s approach hinges on its ability to continuously adapt to the rapid pace of modern attacks—especially those leveraging AI—by automating the detection of adversary infrastructure in its nascent stages. The company’s methodology involves deploying AI-driven analysis to trace attacker resource development, yielding early warning signals that often precede traditional indicators of compromise. This pre-emptive strategy empowers clients with actionable insights and collaborative efforts with internet services to block threats before they materialize. Reported by Malanta’s leadership, including CEO Kobi Ben Naim, the startup’s success and pioneering approach have garnered significant investment, positioning it to revolutionize cybersecurity by preventing attacks before they happen, rather than merely responding after damage has been done.

Potential Risks

The emergence of Malanta from stealth mode with $10 million in seed funding highlights a critical vulnerability that any business can face—an unexpected, high-profile debut that rapidly amplifies competitive pressures, investor scrutiny, and customer expectations. Such a scenario can significantly disrupt your market position by attracting attention away from your enterprise, inviting intensified competition, and heightening the threat of innovative disruptors. It can also strain resources, challenge strategic focus, and diminish customer trust if your business isn’t properly prepared to respond swiftly to the heightened visibility and accelerated industry dynamics. Ultimately, without proactive planning and agility, your company risks falling behind, losing market share, and failing to capitalize on opportunities that arise when new competitors emerge with substantial backing and credible momentum.

Possible Actions

Timely remediation is crucial to minimize the impact of emerging threats and prevent potential exploitation, especially when new entities like Malanta pose unknown vulnerabilities to organizations. Rapid response ensures vulnerabilities are addressed before adversaries can leverage them for malicious gains.

Threat Identification

  • Conduct comprehensive vulnerability assessments
  • Monitor for signs of compromise or suspicious activity

Containment Strategies

  • Isolate affected systems immediately
  • Disable compromised accounts or services

Eradication Measures

  • Remove malicious code or unauthorized access points
  • Patch software vulnerabilities related to the breach

Recovery Procedures

  • Restore systems from clean backups
  • Test to ensure systems are secure before returning to normal operation

Communication Plans

  • Notify relevant stakeholders and authorities as required
  • Provide transparent updates to internal teams

Review & Prevention

  • Conduct root cause analysis
  • Update security policies and controls accordingly

Advance Your Cyber Knowledge

Stay informed on the latest Threat Intelligence and Cyberattacks.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update cyber risk cybercrime Cybersecurity funding MX1 risk management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Teams Vulnerability: Attackers Can Impersonate Colleagues and Alter Messages
Next Article Eroding U.S. Cyber Resilience: Breach, Job Cuts, and Shutdown Threats
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Redefining Productivity: Why AI Should Replace Workflows

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026

Comments are closed.

Latest Posts

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026

Hackers Exploit Multiple AI Services to Breach Over 600 FortiGate Devices

February 21, 2026

Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks

February 20, 2026
Don't Miss

Redefining Productivity: Why AI Should Replace Workflows

By Staff WriterFebruary 22, 2026

Essential Insights Shift in Mindset: Transition from improving existing GRC workflows to reimagining them for…

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Redefining Productivity: Why AI Should Replace Workflows
  • Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware
  • Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru
  • Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable
  • Hackers Exploit Multiple AI Services to Breach Over 600 FortiGate Devices
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Redefining Productivity: Why AI Should Replace Workflows

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru

February 22, 2026
Most Popular

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202512 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202510 Views

The CTEM Conversation We All Need

June 30, 202510 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.