• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Augur’s threat prevention platform uses AI and behavioral modelling to analyze global internet infrastructure to detect the earliest signs of malicious intent, months before attacks go live

April 28, 2025 //  by Finnovate

Augur, the AI-powered threat prevention company, has raised $7 million in seed funding, to expand the development of its industry-first predictive threat prevention platform that uses AI to monitor global internet activity, profile attacker behaviors, and map attack infrastructure. Augur’s platform identifies attack infrastructure setup months in advance of it being weaponized, on average. Augur moves first, identifying malicious infrastructure during setup, months before it’s used, providing actionable foresight. The solution integrates seamlessly into customer environments, autonomously identifying threats and coordinating responses through existing security controls. Using AI and behavioral modeling, the Augur platform analyzes global internet infrastructure to detect the earliest signs of malicious intent, months before attacks go live. With a near-zero false positive rate (0.007%), Augur identifies attack infrastructure, enabling security teams to act early, automate enforcement, and shut down attacks before they start. With Augur, security teams retain full control, whether autonomously blocking threats or surfacing critical intelligence for human review. Augur has repeatedly demonstrated its ability to shield customers from landmark cybersecurity incidents with far-reaching consequences—identifying attack infrastructure long before exploitation begins: APT 29 supply chain attack on SolarWinds; DarkSide ransomware attack on Colonial Pipeline; Multiple threat actors exploiting the Log4j vulnerability; Cl0p ransomware group exploiting the MOVEit vulnerability; Volt Typhoon attacks on US critical infrastructure; UNC5537 breach of Snowflake; ALPHV/BlackCat ransomware attacks on Change Healthcare and Load Depot

Read Article

 

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Dashlane’s AI security platform intelligently detects and alerts end users when they visit a malicious website to tackle AI-powered phishing and shadow IT and uses zero-knowledge encrypted vault for secure credential management
Next Post: Automotive CDP Fullpath integrates Urban Science’s daily defection (lost sales) data allowing dealers to identify leads who made new, or certified preowned (CPO), vehicle purchases at same- and competitive-brand dealerships »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy