Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/10/2014
10:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Malwarebytes Raises $30 Million in Series A Funding from Highland Capital Partners

Next-generation endpoint security company aims for continued innovation and growth to protect consumers and enterprises from advanced online threats

San Jose, Calif. – July 10 2014:Malwarebytes, the company founded to protect people and businesses from advanced online threats, today announced it has received $30 million in Series A funding from Highland Capital Partners. The new financing will be used to accelerate the global expansion of Malwarebytes’ cutting-edge security technologies, which stop sophisticated threats that defeat traditional endpoint security products.

Launched in 2008, Malwarebytes has gained a considerable following of consumer and enterprise customers who use its products to stop advanced malware, zero-day exploits and mobile threats. The company’s free software was recently named in an Opswat Anti-Virus Market Share report to have the second highest number of user-installs worldwide, behind only Microsoft.

Malwarebytes has recently announced two innovative new products, including one of the world’s first mass-market anti-exploit technologies. The company’s enterprise offering also continues to gain traction with organizations seeking to protect themselves from today’s targeted data breaches, contributing to significant revenue growth and a tripling of staff.

“With no previous funding, the Malwarebytes team has built an advanced engine which has stopped billons of cutting-edge threats. The company’s reputation for detecting the most sophisticated malware in this way has created a hugely loyal customer-base,” said Corey Mulloy, Partner at Highland Capital Partners.

“With over 60 million quarterly active users, Malwarebytes already has significant market penetration,” added Jeremiah Daly, Partner at Highland Capital Partners. “We look forward to helping the company build on this user-base and continue developing innovative products which address the growing demands of today’s advanced threat landscape.”

“We’re proud to join the Highland Capital portfolio and this round of financing will accelerate our global expansion plans,” said Marcin Kleczynski, CEO of Malwarebytes. “It will allow us to continue building an even better company for protecting our devoted army of personal users and businesses all over the world.

Kleczynski continued, “It has been our goal from the very beginning to develop technology to fight cutting-edge malware, and we plan to develop the best products to achieve this. As the bad guys continue to advance, Malwarebytes will keep evolving.”

One of this year’s EY Entrepreneurs of the Year, Kleczynski developed the earliest versions of the software while working as a technician when he was just 14. Four years later in 2008, the company formally launched with a free tool co-developed alongside two fellow enthusiasts who he met in an online forum.

The danger to consumers and enterprises from advanced malware that bypasses traditional security products continues to grow, as cybercriminals use increasingly sophisticated techniques. Recent research conducted by the Enterprise Strategy Group for Malwarebytes found that 49 percent of enterprises have suffered a successful breach in just the last 24 months.

 Malwarebytes was advised by Rupert Cook of Realise Capital Partners. More information on the company can be found here.

 About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company’s flagship product, employs a highly advanced behavior-based detection engine that has removed more than 5 billion malicious threats from computers worldwide. Founded in 2008, the company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

 ##

 

All names and trademarks are the property of their respective firms.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVE-2019-19011
PUBLISHED: 2019-11-17
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.