{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAkKyC8OoKDA","lastupdate":"2022-04-17T00:00:00.000Z","update_date":"2022-04-17T00:00:00.000Z","lastModified":"May 26, 2025","active":1,"confidence_score":87,"confidence_score_reason":"video or image, funding rounds, news, markets, not claimed","urlname":"twilight-cyber","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$2AUQkZyc1WLLCUcsrUvR8M586S2JJBrqjDUINxnuElZOgMCLO2q56N","name":"Twilight Cyber","oneliner":"Asset Monitoring and Breach Detection Platform","registrar":"516581139","website":"https://twilightcyber.com","careerspage":"","founded_month":3,"founded_year":2022,"formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"https://www.linkedin.com/company/80057288","instagram":""},"social":["https://www.linkedin.com/company/80057288"],"flattenedsociallinks":"https://www.linkedin.com/company/80057288","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":null,"employees":"11-50","employees_exact":12,"patent":0,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["TWILIGHT CYBER LTD"],"about":"Twilight Cyber has developed a Solution for ongoing monitoring of web-assets such as subdomains, IP addresses and email addresses. The company's platform alerts users within 24 hours of potential data breaches and provides leaked information for immediate action to reduce the risk of attack. The platform is offered as a SaaS model with a user portal and API access for partners to integrate with their systems.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"","country":null,"address":{"israeli":[{"id":"5KcU0hsFxSH20ghRBMME1WwsAbCOAkOhjQAtrT5sVSxlCL3x70wGit","city":"Qatsrin","type":null,"address":"Gamla Promenade 17, Qatsrin","placeid":null,"notactive":null,"openeddate":null,"registrarid":null,"firstrdcenter":null,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":null,"news":[],"newsNumber":0,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":["data-protection","ransomware","threat-detection","cyber-security"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B","B2C"],"productstage":"Beta","products":[],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Amir Erez","email":"amir@twilightcyber.com","phone":"","gender":"Male","userid":"s6mJYp4fiFE0PZWojrMi0kT1VEXpsjn8fAc9WfveYjhiqyL8GQrkzN","bounced":true,"claimed":null,"founder":1,"urlname":"amir-erez-2","visible":1,"memberid":"o42zJMrn13DkXDw5acubrVac8R7zHZ13KkoWf6uIRQ7R7mSk9rrEHr","position":"Co-founder & CEO","last_name":"Erez","claimtoken":"7ENMkEhv0ttS8cU13ozhfZtaS8llxiePWVc4s6vHD7q6mxNztPLY6I","first_name":"Amir","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/amir-erez-1a82271/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2023-05-15 18:38:05.000000","initials":"AE","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Netanel Elbaz","email":"netanel@twilightcyber.com","phone":"","gender":"Male","userid":"YZzxVTfuBMSRgdEnyN6ZxNv1vsPERBx1o9fuLCl9qKGql7QF6UBCTf","bounced":true,"claimed":null,"founder":1,"urlname":"netanel-elbaz","visible":1,"memberid":"sJDfyEeoWUubPbCGSvU4gtiMTTG71SBCfxeQaSxaS6FJXidPAcecxk","position":"Co-Founder and CTO","last_name":"Elbaz","claimtoken":"pFYu0b107TxGkNWqH0WnFd2tMH248B3kLRYsgyyulLolPhB4bIkYvC","first_name":"Netanel","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/netanel-elbaz-49698918a/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2023-05-15 18:38:08.000000","initials":"NE","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Roy Golombick","email":"roy@twilightcyber.com","phone":"","gender":"Male","userid":"RPF6hFI3X6Ue4cwKhoXEgxYG5bu0fpEWjSmeiYOvQQghoiJCoq9y37","bounced":false,"claimed":null,"founder":0,"urlname":"roy-golombick","visible":1,"memberid":"hfbZxctg9iWT7NTHD4aePV24KOjp8YZqqcEPedyDEVu5NpORMNvact","position":"CMO","last_name":"Golombick","claimtoken":null,"first_name":"Roy","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"RG","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Nadav Peleg","email":"nadav@twilightcyber.com","phone":"","gender":"Male","userid":"bKTpt9djhUi9GsY5XtPTLvBtUQ2QovaV45R5MdGjxNjDffPVQyzIfi","bounced":false,"claimed":null,"founder":0,"urlname":"nadav-peleg-1","visible":1,"memberid":"tJD0uf3Dli5x0fVflsHGbC6FmrAAOP4TA71ueAISLpCJcPDlwgcsXB","position":"CRO","last_name":"Peleg","claimtoken":null,"first_name":"Nadav","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"NP","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":0,"tag_line_edited":0,"sector":"Security Technologies","sectorverify":null,"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":null,"crunchbaseid":null,"lastupdator":"Matan Eblagon","lastupdator_email":"matane@sncentral.org","creator":"Matan Eblagon","creator_email":"matane@sncentral.org","createdate":"2022-04-17T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"3/2022","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Twilight Cyber","logourl":"https://storage.googleapis.com/clean-finder-353810/$2AUQkZyc1WLLCUcsrUvR8M586S2JJBrqjDUINxnuElZOgMCLO2q56N","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$2AUQkZyc1WLLCUcsrUvR8M586S2JJBrqjDUINxnuElZOgMCLO2q56N","seoabout":"Twilight Cyber has developed a Solution for ongoing monitoring of web-assets such as subdomains, IP addresses and email addresses. The company's platform a...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":4,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"API","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Government & City","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>API#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","IndustryClassificationModel>Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/API#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|1:>IndustryClassificationModel/Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Application & Website Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Application & Website Security"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]},{"title":"Government & City","key":"0-1","path":"IndustryClassificationModel>Government & City"}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"API","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>API"},{"title":"Software","key":"0-0-1","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"API","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Government & City","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Application & Website Security"],"coreTechnology":["Platforms & Interfaces","API","Software"],"targetCustomer":["Enterprise & Professional Services","Enterprises","Government & City"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}