IoT
5/14/2018
11:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Regulus Cyber Raises $6.3M for Security, Reliability of Autonomous Cars, Trucks, Robots, Drones

(Haifa, Israel – May 1, 2018) Regulus Cyber today announced its Pyramid™ Suite of products, the first end-to-end solutions that provide security and mission reliability to the communication and sensor suite of autonomous cars & trucks, robots and drones, ensuring safety and operational robustness, supported by $6.3 million in Seed and Series A funding from Sierra Ventures, Canaan Partners Israel, the Technion and F2 Capital.

The security of autonomous vehicles is a concern that all automakers and OEMs are faced with since the very sensors that are at the heart of the vehicles (e.g., GPS, LiDAR, radar and cameras) are vulnerable to attacks.

Regulus Pyramid GPS SP (GPS Spoofing Protection) for autonomous vehicles and drones is a standalone module that integrates seamlessly with any vehicle.  It is designed to protect the GPS system from spoofing attacks by differentiating between reliable GPS signals coming from satellites versus attack signals coming from illegitimate sources.  The Pyramid GPS SP is a very small module (under 50 grams, 2 ounces) and is the first commercial grade solution to detect spoofing attacks on a Global Navigation Satellite System (GNSS).

Regulus also developed the Pyramid CSM (Communication & Security Manager) to guard drones from hacking and mission interference.  Regulus Pyramid CSM is an external plug-and-play solution that protects drones from hackers via encryption and authenticity, ensures the safety of the communication and data being transmitted, and provides a visual heat map of the drone’s quality of communication so that remote pilots can have a comprehensive view of each drone’s flight path to assist in planning of future missions.

Security solutions for drones are imperative since the risks of a drone being hacked and flying off-course can be dangerous and perhaps life threatening.  In addition to protecting the physical drone, the data that the drone is transmitting is crucial to have protected since UAVs can collect sensitive private data and are used in highly confidential and mission critical operations.

"We are very excited to lead this round of financing. Sensors security for autonomous machines will become as important as processors security.   Regulus identified the key vulnerabilities and developed the best-in-class solutions,” states Ben Yu, Managing Director of Sierra Ventures.  “Having been working with the company since seed funding, Sierra invested with strong confidence in the team to build Regulus into the category leader."

Regulus is led by Yonatan Zur, CEO, and Yoav Zangvil, CTO, who are both recognized as entrepreneurs and experts in security solutions for the military/homeland security.  “In both newly emerging industries – autonomous vehicles and unmanned aerial vehicles – ensuring the security and mission reliability of each vehicle will be crucial,” says Zur.  “Our solutions were developed to provide peace of mind, lower insurance rates and liability, and minimize equipment risk in an ever-evolving threat and interference environment.”

"We are proud to join the Regulus Cyber team in their journey towards building a leading security company in the fast growing space of autonomous systems", said Izhar Shay, Managing General Partner at Canaan Partners Israel. "We seek long term partnerships with entrepreneurs who are passionate about their ideas and diligent on executing their plans, and this is exactly what we have found at Regulus."

“F2 is excited to invest in Regulus and be a part the company’s vision to lead the market for autonomous vehicles security and reliability,” says Jonathan Saaks, Managing Partner at F2 Capital. “The need for a system like Regulus' will continue to grow and the company is very well positioned to be the leader in this space.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.