• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Israel News

#Israel: Israel in social media

  • About
  • Sponsored Post
  • Contact

Myrror Security Raises $6 Million to Revolutionize Application Security in the Face of Rising Software Supply Chain Attacks

November 7, 2023 By admin Leave a Comment

Myrror Security, an Israeli company specializing in application security for organizations utilizing open-source packages, has officially launched today, backed by $6 million in seed funding from prominent investors Blumberg Capital and Entrée Capital. The primary objective of Myrror Security is to bolster the security of enterprises’ Software Development Life Cycle (SDLC) process, given the escalating threat of software supply chain attacks exploiting open-source dependencies and CI/CD pipelines. The infusion of capital will empower the company to enhance its product capabilities and expand its distribution channels.

In recent years, there has been a significant surge in software supply chain attacks, with a staggering 740% increase in Open Source Software (OSS) supply chain attacks reported in 2022. These attacks target the SDLC through various vectors, with open-source components being one of the most accessible and concerning entry points, as they constitute a substantial portion (70-90%) of modern software. Conventional solutions primarily focus on known vulnerabilities but fail to address unknown risks. Moreover, they inundate security teams with alerts for vulnerabilities that may not even be present in the final code, creating unnecessary distractions and a false sense of urgency. Security teams are in dire need of a solution that can accurately detect real threats, prioritize them, and facilitate efficient remediation, allowing them to concentrate on the most critical software supply chain risks.

Myrror Security’s platform seamlessly integrates two crucial aspects necessary to combat modern software supply chain threats effectively: the detection of malicious packages and CI/CD attacks, and the prioritization of known vulnerabilities. Utilizing proprietary binary-to-source code analysis capabilities and advanced AI matching techniques, the company can identify both known and unknown threats, such as malicious packages, malicious code, and CI/CD breaches, in real-time—before they can reach the production environment. Additionally, Myrror Security employs an advanced reachability model in its Code Aware Software Composition Analysis (SCA) solution to determine whether a vulnerable function is utilized in the code, reducing the noise generated by traditional SCA tools. The company also provides comprehensive mitigation plans to expedite and facilitate risk remediation.

Yoad Fekete, Co-Founder and CEO at Myrror Security, remarked, “The integration of unverified open-source components into the software development process creates a massive attack risk on one hand, and a large amount of false positives for security teams on the other hand. Until now, there hasn’t been a solution on the market capable of tackling both of these problems effectively. We founded Myrror Security to help security teams protect their organizations from attacks and sort through their mess of alerts before code gets to production, without requiring any engineering behavioral change.”

Myrror Security’s Breach Detection solution employs a distinctive AI-enhanced binary-to-source analysis process, allowing it to reverse-engineer binary artifacts and compare them to the original source code. Any discrepancies trigger real-time alerts, thereby preventing compromised packages from ever making their way into the software.

Ilia Shnaidman, Vice President at Blumberg Capital, emphasized the evolving tactics of malicious actors, stating, “Malicious actors continue to shift their attention to the software development process – using open-source packages and CI/CD pipelines to infiltrate companies that otherwise have tight security in place. There is a clear market demand for a solution that detects attacks and prioritizes vulnerabilities and helps defenders address this risk.”

Zohar Alon, Chairman at Myrror Security, highlighted the inherent risks associated with the use of open-source components in application development and praised Myrror Security’s pioneering binary-to-source analysis solution for its proactive approach to addressing the SDLC security challenge.

Myrror Security aims to transform the industry by providing a comprehensive solution that prioritizes risk, detects attacks, and offers mitigation plans within a single platform, ultimately leading the way toward end-to-end software integrity.

Filed Under: Featured Posts

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • No Victory, No Change: An Israeli Citizen’s View After 40 Days in Shelters
  • Lapid on the Iran Ceasefire: Netanyahu Failed Politically and Strategically
  • “If someone comes to kill you, rise early and kill him first.” — Talmud, Sanhedrin 72a
  • Good Riddance: Former Iranian President Mahmoud Ahmadinejad Killed in Israeli Strikes
  • Welcome to Hell, Khamenei
  • Storm Light Over Haifa, Today and Tomorrow, Haifa
  • Israel Tech Week Miami (ISRTW), April 27–30, 2026, Miami, Florida
  • A Carnival That Crossed the Line
  • Madrid’s Museo Reina Sofía Falls to Antisemitism
  • At the Center of the Storm: ZIM, Haifa, and the Politics of Ownership

Media Partners

  • Cybersecurity Market
  • Technology Conferences
Trent AI and the Security Layer the Agentic Stack Has Been Missing
Gartner Security & Risk Management Summit, June 1–3, 2026, National Harbor, MD
Ashdod Port Has Blocked 134,000 Cyberattacks—and Kept Israel’s Trade Moving
Black Hat Asia 2026, April 23–24, Singapore
World Backup Day 2026: Why Recovery Has Become the Real Test of Cyber Resilience
Cyberhaven Launches Agentic AI Security as Shadow Agents Move Onto the Enterprise Endpoint
Palo Alto Networks Rewrites Security for the Agentic AI Era
RSAC Conference 2026, March 23–26, San Francisco
AI-Speed Warfare Comes to Cybersecurity: Booz Allen’s Vellox Suite Signals a Structural Shift
Cape Rebuilds the Mobile Carrier from Scratch, Raises $100M to Turn Privacy into Infrastructure
JSNation 2026, June 11 & June 15, Amsterdam and Remote
ICMC 2026, July 30–31, Long Beach
Elevate 2026, April 22–24, 2026, Atlanta
WWDC 2026, June 8–12, Cupertino & Online
Zip Forward Europe 2026, April 16, 2026, London
AI Summit: Operationalizing Intelligence and Driving Innovation, April 16, 2026, Woburn, Massachusetts
GTC 2026, March 16–19, San Jose
Taiwan’s AI Ecosystem Steps Into the Spotlight at NVIDIA GTC, March 16–19, 2026
COMPUTEX 2026, June 2–5, Taipei
360° Mobility Mega Shows 2026, April 14–17, Taipei

Media Partners

  • Defense Market
  • Technologies.org
ATARS Meets the M-346: Why Leonardo and Red 6 May Be Rewriting the Logic of Fighter Training
Dark Eagle: The U.S. Army’s Long-Range Hypersonic Weapon, Brief Overview
The Army Just Launched a Solicitation for a Heavier ISV — Here’s What We Know
The ISV’s $308 Million Budget Request — and Why Congress Is Pushing Back
From Prototype to Full-Rate Production: The ISV’s Development Timeline
ISV Specs and Deployment: How the Army Gets This Vehicle Into a Fight
Meet the ISV: The Army’s Lightweight Vehicle Built for Speed Over Armor
Affordable Mass: DARPA’s Push for Cheap Missiles Signals a Doctrinal Reset in Modern Warfare
Cheap Wins Wars: America’s Late Turn Toward Cost-Asymmetric Weapons
From Scrap to Supremacy: 6K Additive’s $1.95M Bet on Rebuilding the U.S. Defense Material Base
How to Actually Use a Raspberry Pi Without Overthinking It
Chapter’s $100 Million Bet on AI for Retirement
Galaxy A57 5G vs A37 5G Review: Samsung Pushes “Everyday AI” Further Down the Stack
Samsung Galaxy A37 5G Review: The Sensible Choice
Samsung Galaxy A57 5G Review: The Mid-Range Bar Gets Higher
AfterQuery Raises $30M at $300M Valuation as the AI Race Collides with Its Real Constraint
Xoople Raises $130M to Build the “System of Record” for the Physical World
AI Looms and the Return of American Apparel Manufacturing
Manna’s Second Act: From Drone Novelty to Logistics Infrastructure
Britain Advances SMR Deployment with £300M Owner’s Engineer Contract

Copyright © 2015 IsraelNews.org

Technologies, Market Analysis & Market Research Reports, Photography

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT