Search company, investor...

Founded Year

2013

Stage

Option/Warrant - II | Alive

Total Raised

$129.92M

Last Raised

$7.43M | 9 mos ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

-71 points in the past 30 days

About Red Canary

Red Canary focuses on cybersecurity, operating within the information technology and services industry. The company offers detection and response services, providing security for endpoints, cloud workloads, networks, identities, and SaaS applications. Its primary customers are organizations across various sectors that require robust cybersecurity solutions. It was founded in 2013 and is based in Denver, Colorado.

Headquarters Location

1601 19th Street Suite 900

Denver, Colorado, 80202,

United States

855-977-0686

Loading...

Loading...

Expert Collections containing Red Canary

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Red Canary is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

9,492 items

These companies protect organizations from digital threats.

Latest Red Canary News

Identity-based Cyber-attacks Are Surging

Sep 20, 2024

20 September 2024, 12.36pm Red Canary’s mid-year Threat Detection Report unveils shifts in top cyber-threats for 2024, with identity-based and web-native attacks leading the charge. Cybersecurity firm Red Canary today released a major mid-year update to its annual  Threat Detection Report , providing insight into how cybersecurity trends, threats, and adversary techniques evolved during the first six months of the year. The report confirms the central role of compromised identities in the attacker playbook, while underscoring the need for an operational approach to security to minimise exposure, detect threats faster, and reduce risk. While most of the threats and techniques identified in the 2024 report remain consistent with the mid-year update, some notable shifts were revealed. Email Hiding Rule – a technique in which adversaries use a compromised account to set up rules to block, redirect, or mark certain emails as spam to cover their tracks – was a new entrant to the list. Notably, combined with Cloud Accounts and Email Forwarding Rule, this meant three of the top ten techniques related directly to identity and cloud-native attacks. There were three notable shifts in the top ten threats in the past six months: Atomic Stealer – an infostealer that targets credentials, payment card data, keychain details, and cryptocurrency wallet information on macOS devices made a surprise entrance at number nine of the top ten threats. Scarlet Goldfinch – an ‘activity cluster’ that uses fake browser updates to trick users into downloading a legitimate remote management and monitoring tool that can be abused to deploy malicious software – was another new entrant at number seven. ChromeLoader – a malicious browser extension that reads and hijacks browser traffic to redirect it to specific sites, likely to conduct pay-per-click advertising fraud – rose from sixth place in 2023 to the number one slot. Within the top ten threats, there was a continued trend away from email toward web-based delivery mechanisms, which accounted for six of those on the list. This indicates that efforts to lock down emails and make it more difficult for adversaries to insert malicious payloads into documents are continuing to pay off. “While there are similarities with our previous list, it’s interesting to see ChromeLoader moving up the charts so dramatically, although this rise is due in part to improved detection capabilities for the threat. “It might seem innocuous, but its broad ability to steal browser data and the potential for bad actors to re-task it for more malicious purposes make it particularly concerning,” said Brian Donohue, principal security specialist, Red Canary. He added: “The fact that Atomic Stealer is in our top ten is also remarkable given the relatively low percentage of our sample formed by macOS devices. We’d strongly urge organisations with a significant macOS footprint to double down on user education around downloading software from untrusted sources. Recommended reading User identities are still the weak link in the chain The report also provides analysis of emergent or otherwise interesting threats and techniques that security professionals should take note of, such as: Adversary in the Middle (AitM) attacks: Adversaries frequently use AitM attacks to bypass multi-factor authentication (MFA). They create seemingly legitimate login pages to lure users into entering credentials and MFA codes, relaying the details in real time to gain access. Token theft: There is a growing trend of adversaries stealing session tokens to access identities, after compromising a cloud service or account. This technique is of especially high risk in AWS environments, where adversaries extract security tokens that ultimately allow them to perform actions within the cloud tenant. Permission sprawl: Organisations also need to be wary of permission sprawl, ensuring they maintain tight control of user privileges across different tools and systems. With thousands of users to manage, it is very easy to grant over-privileged access roles. Application consent phishing: Adversaries often register malicious applications then trick users into granting them permissions that allow the bad actor to access other systems and data via the cloud. “While identity compromise has always been a significant threat, our midyear update highlights it is becoming even more prevalent,” concludes Keith McCammon, chief security officer, Red Canary. “There are solutions that can fortify defenses against these threats, notably phishing-resistant multi-factor authentication, passwordless authentication, conditional access, and monitoring of behaviors and APIs. However, while some of these controls are broadly attainable, others can be expensive and operationally complex. “This is why it’s essential to seek out not only technical solutions, but to build teams and seek out partners who can maximize their effectiveness, and deliver around-the-clock operational capabilities.”

Red Canary Frequently Asked Questions (FAQ)

  • When was Red Canary founded?

    Red Canary was founded in 2013.

  • Where is Red Canary's headquarters?

    Red Canary's headquarters is located at 1601 19th Street, Denver.

  • What is Red Canary's latest funding round?

    Red Canary's latest funding round is Option/Warrant - II.

  • How much did Red Canary raise?

    Red Canary raised a total of $129.92M.

  • Who are the investors of Red Canary?

    Investors of Red Canary include Noro-Moseley Partners, Access Venture Partners, Summit Partners, Kyrus Tech and Service Provider Capital.

  • Who are Red Canary's competitors?

    Competitors of Red Canary include Recorded Future, UnderDefense, BlueVoyant, Cyngular Security, Arctic Wolf Networks and 7 more.

Loading...

Compare Red Canary to Competitors

Arctic Wolf Networks Logo
Arctic Wolf Networks

Arctic Wolf Networks focuses on cybersecurity. The company offers a range of services including detection and response to advanced threats, risk management, cloud security posture management, and incident response. These services aim to protect against digital risks, harden environments against vulnerabilities, and enable quick recovery from cyber attacks. It was founded in 2012 and is based in Eden Prairie, Minnesota.

Cybereason Logo
Cybereason

Cybereason specializes in cybersecurity solutions. It facilitates threat detection and response, ransomware protection, and proactive threat hunting, all designed to provide comprehensive protection against cyber attacks. Its primary customers are businesses and organizations across various sectors that require robust cybersecurity measures. It was founded in 2012 and is based in Boston, Massachusetts.

Vectra Logo
Vectra

Vectra is a cybersecurity company specializing in AI-driven threat detection and response across hybrid and multi-cloud enterprise environments. The company offers a platform that provides integrated signals for extended detection and response (XDR), equipping security operations centers (SOCs) with real-time Attack Signal Intelligence to prioritize and respond to threats. Vectra's solutions cater to a diverse range of sectors including finance, healthcare, government, and more, with a focus on protecting critical infrastructure and managing risks associated with remote workforces and operational technology environments. Vectra was formerly known as TraceVector. It was founded in 2011 and is based in San Jose, California.

Expel Logo
Expel

Expel operates as a security operations company and specializes in managed detection and response (MDR) within the cybersecurity industry. The company offers various services such as 24/7 monitoring, threat detection, incident response, and security infrastructure optimization. Expel was formerly known as The Concern. It was founded in 2016 and is based in Herndon, Virginia.

e
eSentire

eSentire focuses on managed detection and response services in the cybersecurity industry. The company offers a range of services including exposure management services, managed detection and response, and digital forensics and incident response, all aimed at identifying security gaps, improving threat detection, and providing rapid response to cyber threats. It primarily serves various sectors including the insurance, construction, finance, legal, manufacturing, private equity, healthcare, and retail industries. It was founded in 2001 and is based in Waterloo, Canada.

Cyngular Security Logo
Cyngular Security

Cyngular Security provides a threat-hunting, investigation, and response platform. The company's platform helps organizations actively prepare for and respond to cybersecurity incidents, ensuring cyber protection to minimize downtime. It provides users with insights about concrete threats to their cloud environment. The company was founded in 2021 and is based in Tel Aviv, Israel.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.