Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/10/2014
10:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Malwarebytes Raises $30 Million in Series A Funding from Highland Capital Partners

Next-generation endpoint security company aims for continued innovation and growth to protect consumers and enterprises from advanced online threats

San Jose, Calif. – July 10 2014:Malwarebytes, the company founded to protect people and businesses from advanced online threats, today announced it has received $30 million in Series A funding from Highland Capital Partners. The new financing will be used to accelerate the global expansion of Malwarebytes’ cutting-edge security technologies, which stop sophisticated threats that defeat traditional endpoint security products.

Launched in 2008, Malwarebytes has gained a considerable following of consumer and enterprise customers who use its products to stop advanced malware, zero-day exploits and mobile threats. The company’s free software was recently named in an Opswat Anti-Virus Market Share report to have the second highest number of user-installs worldwide, behind only Microsoft.

Malwarebytes has recently announced two innovative new products, including one of the world’s first mass-market anti-exploit technologies. The company’s enterprise offering also continues to gain traction with organizations seeking to protect themselves from today’s targeted data breaches, contributing to significant revenue growth and a tripling of staff.

“With no previous funding, the Malwarebytes team has built an advanced engine which has stopped billons of cutting-edge threats. The company’s reputation for detecting the most sophisticated malware in this way has created a hugely loyal customer-base,” said Corey Mulloy, Partner at Highland Capital Partners.

“With over 60 million quarterly active users, Malwarebytes already has significant market penetration,” added Jeremiah Daly, Partner at Highland Capital Partners. “We look forward to helping the company build on this user-base and continue developing innovative products which address the growing demands of today’s advanced threat landscape.”

“We’re proud to join the Highland Capital portfolio and this round of financing will accelerate our global expansion plans,” said Marcin Kleczynski, CEO of Malwarebytes. “It will allow us to continue building an even better company for protecting our devoted army of personal users and businesses all over the world.

Kleczynski continued, “It has been our goal from the very beginning to develop technology to fight cutting-edge malware, and we plan to develop the best products to achieve this. As the bad guys continue to advance, Malwarebytes will keep evolving.”

One of this year’s EY Entrepreneurs of the Year, Kleczynski developed the earliest versions of the software while working as a technician when he was just 14. Four years later in 2008, the company formally launched with a free tool co-developed alongside two fellow enthusiasts who he met in an online forum.

The danger to consumers and enterprises from advanced malware that bypasses traditional security products continues to grow, as cybercriminals use increasingly sophisticated techniques. Recent research conducted by the Enterprise Strategy Group for Malwarebytes found that 49 percent of enterprises have suffered a successful breach in just the last 24 months.

 Malwarebytes was advised by Rupert Cook of Realise Capital Partners. More information on the company can be found here.

 About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company’s flagship product, employs a highly advanced behavior-based detection engine that has removed more than 5 billion malicious threats from computers worldwide. Founded in 2008, the company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

 ##

 

All names and trademarks are the property of their respective firms.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.