Cyb3r Operations Raises $5.4M to Deliver Real‑Time Third‑Party Cyber Risk Visibility

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

Cyb3r Operations raises $5.4M to deliver real‑time third‑party cyber risk visibility as London‑based startup Cyb3r Operations closed a $5.4 million funding round led by Octopus Ventures with participation from Pi Labs to scale its continuous third‑party risk intelligence platform. The platform addresses a growing blind spot in enterprise security by moving beyond static questionnaires and point‑in‑time audits to provide real‑time, automated insights into supply chain, SaaS, cloud, and external partner exposures. Cyb3r Operations’ solution maps relationships across an organisation’s extended ecosystem, highlights vulnerabilities in external networks and dependencies, and tracks changes in risk over time, giving security teams a dynamic view of third‑party threats. The funding will support deeper threat intelligence capabilities and broader adoption among organisations seeking continuous, contextual third‑party cyber risk assessment. 

Who is affected

Security leaders and teams responsible for supply chain risk management and vendor security programs are directly affected, with exposure tied to external partners, suppliers, and service providers. 

Why CISOs should care

Continuous third‑party risk visibility is essential for detecting supplier vulnerabilities, compliance issues, and upstream threats before they propagate into core enterprise systems. 

3 practical actions

  • Integrate continuous tooling: Deploy automated third‑party risk platforms that map exposed relationships in real time.
  • Align procurement and security: Ensure vendor onboarding and risk assessment processes feed directly into security workflows.
  • Monitor risk evolution: Set alerts for significant third‑party risk changes and adjust security controls accordingly.