CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

Tidal Cyber Secures $10M for CTI and Adversary Behavior Platform

First reported
Last updated
📰 1 unique sources, 1 articles

Summary

Hide ▲

Tidal Cyber, a cybersecurity provider, has raised $10 million in a Series A funding round, bringing its total funding to $15 million. The company develops a threat-informed defense platform that automates detection and response, focusing on cyber threat intelligence and adversary behavior. The platform operationalizes MITRE ATT&CK to provide proactive cyber defenses. The funding will be used to accelerate product innovation and growth. The investment round was led by Bright Pixel Capital, with additional support from previous investors including Capital One, Squadra, Task Force X, Ultratech, USAA, and Veteran Ventures. The company aims to address the growing need for threat-led defense as organizations move beyond traditional security models.

Timeline

  1. 04.09.2025 04:55 📰 1 articles · ⏱ 12d ago

    Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform

    Tidal Cyber, founded in 2022 by former MITRE experts, has raised $10 million in a Series A funding round, bringing its total funding to $15 million. The company's platform automates detection and response using cyber threat intelligence and adversary behavior, operationalizing MITRE ATT&CK. The funding will be used to accelerate product innovation and growth, with the investment round led by Bright Pixel Capital and supported by previous investors.

    Show sources

Information Snippets

Similar Happenings

Salty2FA Phishing Kit Demonstrates Enterprise-Level Sophistication

The Salty2FA phishing kit has evolved to incorporate enterprise-grade features, making it difficult to distinguish from legitimate software. The kit's advanced capabilities include subdomain rotation, abuse of legitimate platforms, dynamic corporate branding, MFA mimicry, and sophisticated defense evasion tactics. Ontinue researchers tracked a campaign using Salty2FA, observing its technical innovations and how it mimics legitimate enterprise systems. The campaign impersonated a known business using a trial account on Aha.io and deployed a OneDrive sharing page as the initial attack vector. The kit's infrastructure supports dynamic branding and advanced evasion techniques, making it challenging for security teams to detect and mitigate. The kit's advanced features include geo-blocking, ASN/IP filtering, and JavaScript-based anti-debugging, which hinder the efforts of security researchers and SOC teams. The Salty2FA phishing kit targets industries including finance, energy, healthcare, government, logistics, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting. Salty2FA activity began gaining momentum in June 2025, with early traces possibly dating back to March–April 2025. Salty2FA campaigns have been active since late July 2025, generating dozens of fresh analysis sessions daily. The kit uses a multi-stage execution chain, including email lures, redirects to fake login pages, credential theft, and 2FA bypass techniques. Salty2FA employs Cloudflare checks to bypass automated filters and uses fake Microsoft-branded login pages to steal credentials. The kit intercepts push, SMS, and voice-based 2FA codes, leading to account takeovers. ANY.RUN sandbox analysis provides full-chain visibility of Salty2FA attacks, revealing behavioral patterns and reducing analyst workload. Defenders are advised to adopt advanced, layered protection and a behavioral-oriented approach to counter these evolving threats.