Threat-Intelligence Startup VulnCheck Closes $8M Seed Financing

Share This Post

VulnCheck, an early stage startup that styles itself as an exploit intelligence company, has closed an $8 million seed-stage funding round led by Sorenson Ventures.

Based in Lexington, Mass., VulnCheck is building technology that promises exploit intelligence for vulnerability prioritization and an early-warning system for in-the-wild software exploitation activity.

Since coming out of stealth last February, VulnCheck said it has seen growing demand for its intelligence services, which promise autonomous vulnerability prioritization correlated with exploit and threat intelligence services.

“VulnCheck’s differentiation is that it delivers better data that’s machine-readable, faster through automation and with zero human interference – at the time of disclosure,” the company said.

Over the last year, VulnCheck said its engineers have focused on helping to fix the vulnerability prioritization challenge with the introduction of features to track vulnerable internet-connected devices and attacker infrastructure and tooling to deliver detection artifacts for zero-day vulnerabilities.

The company also maintains VulnCheck XDB, a repository of exploits and proof-of-concepts hosted on git repositories; and VulnCheck NVD++, a tool offering a stable, high-performance source of NVD 2.0 CVE data via API or downloadable JSON files.

In addition to Sorenson Ventures, VulnCheck is backed by In-Q-Tel, Lux Capital, and Aviso Ventures.

Related: Dark Web Threat Intelligence Startup StealthMole Raises $7 Million

Advertisement. Scroll to continue reading.

Related: Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform

Related: Threat Intel Firm Silent Push Launches With $10M in Seed Funding

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.