Cyb3r Operations Raises $5.4M to Deliver Real‑Time Third‑Party Cyber Risk Visibility

Related

High-Severity Bug in Chrome’s Google Gemini AI Panel Could Have Enabled Hijacking

What happened Google patched a high-severity vulnerability (tracked as CVE-2026-0628)...

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti EPMM Devices

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

UK Warns of Iranian Cyberattack Risks Amid Middle East Conflict

What happened The UK National Cyber Security Centre (NCSC) issued...

CISOs to Watch in Massachusetts’ Insurance Industry

Massachusetts’ insurance sector includes regional carriers, global specialty insurers,...

Share

What happened

Cyb3r Operations raises $5.4M to deliver real‑time third‑party cyber risk visibility as London‑based startup Cyb3r Operations closed a $5.4 million funding round led by Octopus Ventures with participation from Pi Labs to scale its continuous third‑party risk intelligence platform. The platform addresses a growing blind spot in enterprise security by moving beyond static questionnaires and point‑in‑time audits to provide real‑time, automated insights into supply chain, SaaS, cloud, and external partner exposures. Cyb3r Operations’ solution maps relationships across an organisation’s extended ecosystem, highlights vulnerabilities in external networks and dependencies, and tracks changes in risk over time, giving security teams a dynamic view of third‑party threats. The funding will support deeper threat intelligence capabilities and broader adoption among organisations seeking continuous, contextual third‑party cyber risk assessment. 

Who is affected

Security leaders and teams responsible for supply chain risk management and vendor security programs are directly affected, with exposure tied to external partners, suppliers, and service providers. 

Why CISOs should care

Continuous third‑party risk visibility is essential for detecting supplier vulnerabilities, compliance issues, and upstream threats before they propagate into core enterprise systems. 

3 practical actions

  • Integrate continuous tooling: Deploy automated third‑party risk platforms that map exposed relationships in real time.
  • Align procurement and security: Ensure vendor onboarding and risk assessment processes feed directly into security workflows.
  • Monitor risk evolution: Set alerts for significant third‑party risk changes and adjust security controls accordingly.