{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAwPyWqNUIDA","lastupdate":"2018-03-13T00:00:00.000Z","update_date":"2018-03-13T00:00:00.000Z","lastModified":"Sep 28, 2024","active":1,"confidence_score":81,"confidence_score_reason":"description, video or image, funding rounds, markets, not claimed","urlname":"cyberdb","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","hide_reason_data":{"reason":"The company is a service provider","visible":0},"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$oMD8WvvUUfHXtvuRq4LWJPwwcIgDNhD46uKluzCIL9nENWvlXcWahJ","name":"CyberDB","oneliner":"Cyber Security Knowledge Base","registrar":"515549517","website":"https://www.cyberdb.co","careerspage":"https://www.cyberdb.co/jobs","founded_month":3,"founded_year":2016,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/CyberD_B","youtube":"","facebook":"https://www.facebook.com/CyberDataBase","linkedin":"https://www.linkedin.com/company/13185949","instagram":""},"social":["https://twitter.com/CyberD_B","https://www.facebook.com/CyberDataBase","https://www.linkedin.com/company/13185949"],"flattenedsociallinks":"https://twitter.com/CyberD_B|https://www.facebook.com/CyberDataBase|https://www.linkedin.com/company/13185949","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"1-10","employees_exact":4,"patent":0,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":null,"primary_sector":"","alternativenames":[""],"about":"CyberDB is a comprehensive source of information about cybersecurity companies, products, services, and investors.\r\n\r\n","climatetech_description":null,"is_climatetech_relevant":null,"phone":"","country":null,"address":{"israeli":[{"id":"7bc77700-1846-4f81-82d2-ba09f934fede","city":"Herzliya","type":null,"address":"HaHagana Street 56, Herzliya, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":[{"id":"bc94e661-5713-4220-a8bb-38474ddd37b1","city":"Weilrod","address":"Heidestrae 63, Weilrod, Germany","country":"Germany","placeid":null}]},"headquarter_address":null,"district":"Center District","news":[{"id":"fec991ce-3d0d-4a4e-8aaf-aead10379ea2","date":"Oct 17, 2017","link":"https://www.cyberdb.co/threat-hunting-is-it-a-new-product-category-in-cybersecurity/","source":"www.cyberdb.co","visible":1,"analysis":{"tags":"cybersecurity, threat hunting","company":"","layoffs":"","summary":"Threat hunting is emerging as a hot trend in cybersecurity, with organizations actively searching for threats instead of relying on alerts. Threat hunting involves experienced analysts using existing tools and data sources to search for threats and identify breaches. While some vendors claim to offer dedicated threat hunting tools, most tools are subsets of other platforms. Network analysis tools, machine learning tools, endpoint detection and response (EDR) products, and SIEM platforms are all used for threat hunting. Some companies are also offering threat hunting as a service. The Israel Cyber Authority has recommended implementing threat hunting as part of proactive cybersecurity measures. The future of threat hunting may involve regulation and more regulatory bodies requiring proactive threat hunting.","partners":"","customers":"","investors":"","confidence":8,"key_topics":["Threat Hunting","Cybersecurity","Data Breaches","Tools","Regulation"],"date_of_event":"","valuation_amount":"","impact_on_company":"growth-positive","investment_amount":"","structured_issues":["Customers","Partners"],"acquisition_amount":"","structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"fSCmYCETPYf6aTvamnlkAXfyZLsKVSgOeA3WUwVRTRnd1pjs7nt7jE","news_summary":"Threat Hunting- is it a new product category in Cybersecurity","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"2c0e4275-e9d7-4a64-9a00-b8934456888b","date":"Oct 8, 2017","link":"https://www.cyberdb.co/north-korea-cyber-capabilities/","source":"www.cyberdb.co","visible":1,"analysis":{"tags":"cybersecurity, cyber attacks","company":"North Korea","layoffs":null,"summary":"The article discusses North Koreas cyber capabilities and activities, including cyber attacks and the theft of money through cryptocurrencies. It suggests that North Korea primarily uses cyber attacks as a retaliatory measure and to support immediate regime interests. The countrys cyber activities have not shown advanced or sophisticated techniques, and there is little evidence of testing new weaponry. North Koreas cyber attacks are often targeted at South Korea. The theft of money through cryptocurrencies is seen as a means to financially support the regime in the face of strict sanctions. Overall, the article portrays North Koreas cyber activities as a concern but not overly advanced or sophisticated.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["North Korea","cyber attacks","cybersecurity","DDoS attacks","cryptocurrency theft"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"F6SgCGoecZdAHkUlMPk0tH73KJCLseCjPoghLc9Qy2eWr7lY4iLxkK","news_summary":"North Korea Has Cyber Capabilities, But What Are They?","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"818b3f10-f656-4b43-9160-ca129faf1590","date":"Oct 3, 2017","link":"https://www.cyberdb.co/fake-news-critical-thinking/","source":"www.cyberdb.co","visible":1,"analysis":{"tags":"Fake news","company":"Facebook","layoffs":null,"summary":"The article discusses the issue of fake news and its impact on the democratic process, particularly in relation to Russias alleged involvement in creating and disseminating fake news during the 2016 presidential election. It highlights Facebooks disclosure that it had identified more than $100,000 worth of divisive ads suspected of being purchased by a Russian company with ties to the Kremlin. The article also mentions Germanys legal fight against fake news and the need for individuals to evaluate the accuracy of news online. Overall, the article has a negative impact on Facebook as it highlights the companys association with fake news and Russian interference.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Fake news","Russian involvement","Social media platforms","Divisive ads","Russian influence campaign"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"6YZ46VFEGYfNR2IrmEMIAXCTZCC6IqPBAZ6U7j9HSZxOyIjJ7nz29d","news_summary":"Fake News: Determining the Truth Via Critical Thinking  CyberDB","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"5bab91e2-1eea-4f3c-9dc6-88e7a9ef1ac0","date":"Sep 22, 2017","link":"https://www.cyberdb.co/can-a-phoenix-of-accountability-emerge-from-the-ashes-of-the-equifax-breach/","source":"www.cyberdb.co","visible":1,"analysis":{"entityGrowthIconPath":"none;"},"sentiment":null,"analysisId":"MhaPWzTwYjGttGa3hUfgsCtgg2rq1oE2gKqFq9gfUHaArXnjqdTHVY","news_summary":"https://www.cyberdb.co/can-a-phoenix-of-accountability-emerge-from-the-ashes-of-the-equifax-breach/","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"4000e40c-0dfe-4995-a0a1-052916e92802","date":"Aug 5, 2017","link":"https://www.cyberdb.co/automotive-cybersecurity-market-forecast/","source":"www.cyberdb.co","visible":1,"analysis":{"tags":"Automotive, Cybersecurity","company":"","layoffs":"","summary":"The article discusses the growth of the automotive cybersecurity market as self-driving cars become more prevalent. The market is expected to grow at a CAGR of over 9% and has expanded globally. The US and UK governments have issued regulations and guidelines to ensure the safety and security of autonomous vehicles, leading to increased partnerships in the industry. The use of open source code in software poses a security risk, and the article emphasizes the need for cybersecurity to be a priority in the automotive industry. The market is expected to see increased investments in cybersecurity startups in the coming years.","partners":"Renovo, Argus","customers":"","investors":"","confidence":8,"key_topics":["Self-driving cars","Automotive cybersecurity","Legislation","Partnerships","Open source code"],"date_of_event":"","valuation_amount":"","impact_on_company":"growth-positive","investment_amount":"","structured_issues":["Partners","Investment"],"acquisition_amount":"","structuredIssuesShow":"#Partners  #Investment","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"VYSTI7R4bUPw05KvcnfP29m1vtZg0KTNl2rq6qk36AKrKNh5jzZj1s","news_summary":"Automotive Cybersecurity Market Forecast - CyberDB research","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"209c17bc-d000-493d-8b09-7aa3ed20d344","date":"Aug 4, 2017","link":"https://www.cyberdb.co/u-s-naval-mishaps-human-error-or-cyber-malfeasance/","source":"www.cyberdb.co","visible":1,"analysis":{"tags":["Cybersecurity","Malware","Navy","US Navy"],"company":"U.S. Navy","layoffs":null,"summary":"The article discusses a series of naval mishaps involving the U.S. Navy, including the collision of the USS John McCain and an oil tanker near Singapore. There is speculation that cyber malfeasance may have been the cause of these incidents. The article also highlights the importance of maritime cyber security and the potential risks to military naval assets. It mentions previous cyberattacks on shipping companies and the possibility of nation-states targeting naval vessels in the cyber domain. The U.S. Navys security situation and the need for improvements are emphasized. The article calls for a comprehensive strategy to address existing shortcomings before they become a real problem.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["USS John McCain","naval mishaps","cyber malfeasance","maritime cyber security","military naval assets"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"E5wqEFV2pLoyQYg58snaJ3oBihmtf69PAeByLU6U4M7t6VzWyhioHu","news_summary":"U.S. Naval Mishaps - Human Error or Cyber Malfeasance?","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"dec5455d-864e-427b-9054-096c2da970e9","date":"Aug 19, 2016","link":"http://cyberdb.co/the-phishing-epidemic/","source":"cyberdb.co","visible":1,"analysis":{"tags":"Cyber, Cybercrime, Cybersecurity, Phishing","company":"CyberDB","layoffs":null,"summary":"The article discusses the problem of phishing emails and their impact on organizations. It emphasizes the importance of training employees to recognize and prevent phishing attacks. The article is a guest blog post on CyberDBs website.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Phishing","Cybersecurity","Training","Risk assessment","Employee awareness"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"NShoqh9HQlzbc90yOovz3R6nr0Do50VwFfxFe3tJ9kZVxE5wnuETAB","news_summary":"The Phishing Epidemic  CyberDB","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"4e49f786-cde9-49ee-be35-812e29e39fe9","date":"Aug 1, 2016","link":"http://cyberdb.co/cyber-threat-intelligence/","source":"cyberdb.co","visible":1,"analysis":{"tags":"Cybersecurity, Threat Intelligence","company":"iSIGHTPARTNERS","layoffs":null,"summary":"The article discusses the role of threat intelligence in cybersecurity and the need for disruption in current cybersecurity approaches. It mentions attending a GDS Engagement Evening hosted by Admiral Patrick Walsh from iSIGHTPARTNERS (prior to its acquisition by FireEye). The author believes that the existing implementations of vulnerability and patch management in global enterprises are costly and provide little benefit. They highlight the difficulties in assessing risk and reaching agreement on patching, leading to unsustainable costs. The author finds the discussion with Pat compelling and sees cyber threat intelligence as a means of reducing the internal assessment of vulnerabilities. They believe that cyber threat intelligence can complement existing threat response mechanisms and lead to cost savings. The article is tagged with keywords related to cybersecurity, threat intelligence, and risk assessment.","partners":"FireEye","customers":null,"investors":null,"confidence":8,"key_topics":["Cybersecurity","Threat Intelligence","Patch Management","Risk Assessment","Cost Saving"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Acquisition"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Acquisition","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"wWZ977Zas98AZSVGNInEZD95Wdgv4vaCN6jhYwVXltUSHpOSzKklsE","news_summary":"Cyber Threat Intelligence and pragmatic risk assessment  CyberDB","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":8,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":["service-providers","cyber-security","banks","private-investors"],"classificationIDs":[],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":[],"geomarkets":["Asia","United States","Europe"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Elias Chachak","email":"elias_ch1@yahoo.com","phone":"972523670513","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAwPz418MLDA","bounced":false,"claimed":0,"founder":1,"urlname":"elias-chachak-1","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgIDAvfCz-AgM","position":"Founder","last_name":"Chachak","claimtoken":"135d2883ce6a6180e18e798bc3bed354436d0b22f09108d1e3eece38a8eb1610","first_name":"Elias","picturekey":"$1lFNnBnLzPUuB5q4isBwljayps6BZMJhVZvoyGzLanybRtmhKXuZLM","claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/eliaschachak","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2017-02-26 08:04:16.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$1lFNnBnLzPUuB5q4isBwljayps6BZMJhVZvoyGzLanybRtmhKXuZLM","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Yotam Gutman","email":"yotam.gutman@gmail.com","phone":"0522842158","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgJ7dhfoJDA","bounced":false,"claimed":1,"founder":0,"urlname":"yotam-gutman-2","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgIDA_IOP2wgM","position":"VP Marketing","last_name":"Gutman","claimtoken":"143921c7dc21b3740c945be8259fef00ba9c4b87bb30e80a183cc3365db4aa83","first_name":"Yotam","picturekey":"$iO1RiG7YjKq1It58bfXGwLFIKRvG5RsuttKLC6R552N7gooIIuSp39","claimeddate":"2016-07-20","linkedinurl":"https://www.linkedin.com/in/yotamgutman","unsubscribed":false,"is_activeuser":1,"additionalemail":"yotam.gutman@cytegic.com","claimedemaildate":null,"initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$iO1RiG7YjKq1It58bfXGwLFIKRvG5RsuttKLC6R552N7gooIIuSp39","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":null,"biverify":null,"biverifydate":"2016-07-20T00:00:00.000Z","crunchbaseid":"cyberdb","lastupdator":null,"lastupdator_email":null,"creator":"Yotam Gutman","creator_email":"yotam.gutman@gmail.com","createdate":"2016-07-20T00:00:00.000Z","biverification":null,"sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"3/2016","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"CyberDB","logourl":"https://storage.googleapis.com/clean-finder-353810/$oMD8WvvUUfHXtvuRq4LWJPwwcIgDNhD46uKluzCIL9nENWvlXcWahJ","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$oMD8WvvUUfHXtvuRq4LWJPwwcIgDNhD46uKluzCIL9nENWvlXcWahJ","seoabout":"CyberDB is a comprehensive source of information about cybersecurity companies, products, services, and investors.\r\n\r\n","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":2,"classifications":[],"classificationDelimited":[],"classificationsViewModel":"|","classificationTrees":{"sector":[],"targetCustomer":[],"coreTechnology":[]},"sectorClassifications":[],"coreTechnologyClassifications":[],"targetCustomerClassifications":[],"classificationNames":{"sector":[],"coreTechnology":[],"targetCustomer":[]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}