- Cycore Insights
- Posts
- Zenity’s $38M Boost to Agentic AI Security: What It Means for the Future of Cyber Defense
Zenity’s $38M Boost to Agentic AI Security: What It Means for the Future of Cyber Defense
Zenity's recent $38M funding marks a pivotal step in advancing agentic AI security, promising enhanced defenses against sophisticated cyber threats.

Happy Thursday !
Welcome to Cycoresecure.io, your go-to partner for transforming security and compliance into effortless processes. Whether you're a startup or a growing tech company, we provide services to tackle your biggest security challenges, freeing you to focus on scaling your business with confidence. Let's secure your future together!
Make sure to follow our Cycore LinkedIn page and subscribe to receive updates on current events, trends, and industry news that matter to you
In Today's Rundown
Let’s dive right in.
You're reading the Cycore Insights newsletter.
Get exclusive coverage of cybersecurity and privacy delivered once a week.
What caught our attention: Zenity’s $38M Boost to Agentic AI Security: What It Means for the Future of Cyber Defense
In a standout moment for cybersecurity, Zenity has raised $38 million in Series B funding to advance its tools for securing Agentic AI systems—a class of AI-driven applications that require heightened protection due to their interactive and autonomous nature. This investment positions Zenity to tackle an emerging frontier in cybersecurity, where AI systems act independently but still need robust, adaptive defenses. By focusing on Agentic AI, Zenity aims to safeguard critical AI-driven processes in industries ranging from finance and healthcare to e-commerce and logistics.
Agentic AI systems differ from traditional AI in that they actively make real-time decisions, often with limited human oversight. Zenity’s solution will employ advanced threat modeling, real-time monitoring, and response capabilities tailored to detect and mitigate the nuanced threats Agentic AI applications face. These features allow for dynamic security controls that adjust based on the context of AI-driven activities, effectively preventing malicious tampering, unauthorized access, and exploitation attempts that could otherwise go undetected. Zenity’s approach reflects an increasing need for cyber defenses that adapt alongside intelligent systems, ensuring that AI applications not only perform optimally but also remain secure in complex environments.
Cycore’s Take: Shaping the Future of AI Security Standards
At Cycore, we recognize Zenity’s advancements as part of a larger trend where security must evolve to meet the sophistication of modern cyber threats. Our perspective aligns with Zenity’s focus on intelligent security for AI-driven applications, as we believe that securing AI systems requires proactive, adaptable measures. Cycore’s own compliance solutions will benefit from insights derived from developments in Agentic AI, supporting a safer environment for enterprises deploying AI in sensitive contexts. Together, we anticipate a future where companies can innovate with confidence, backed by robust, AI-specific cyber defenses.
Sources
Security, Privacy, and Compliance Round-up
Security
Interpol Disrupts Cybercrime Infrastructure
In Operation Synergia II, Interpol took down over 22,000 IP addresses and 1,037 servers linked to cybercriminal activities, resulting in 41 arrests. This international operation underscores the global effort to dismantle cybercriminal networks.Chinese Botnet ‘Quad7’ Targets Routers for Credential Theft
Microsoft identified the Quad7 botnet, leveraged by Chinese threat actors to launch password-spraying attacks, affecting a range of compromised routers. This botnet exemplifies the evolution of sophisticated credential-based attacks.DocuSign APIs Abused for Phishing Attacks
Attackers are exploiting DocuSign's "Envelopes: create API" to flood inboxes with realistic fake invoices, aiming to deceive recipients and bypass spam filters. This technique emphasizes the importance of vigilant email security practices.CRON#TRAP Phishing Campaign Uses Emulated Linux Backdoor
In a novel approach, a phishing campaign dubbed CRON#TRAP has been embedding a Linux virtual machine with a built-in backdoor within Windows, providing threat actors covert access to networks.
Privacy
South Korea Fines Meta $15.67M for Data Privacy Violations
Meta faced a $15.67 million fine in South Korea for collecting and sharing sensitive user information, including political views and sexual orientation, without user consent. This fine emphasizes stricter global enforcement of data privacy standards.Google Cloud to Enforce MFA by 2025
Google announced that by the end of 2025, all Google Cloud users will be required to enable multi-factor authentication, a critical step to bolster account security and protect user data.Canada Arrests Suspect in Snowflake Data Breach
Canadian authorities arrested a suspect involved in breaching Snowflake’s cloud infrastructure and allegedly targeting over 165 organizations. This breach raises concerns around third-party security and data handling practices.City of Columbus Ransomware Attack Impacts 500,000 Residents
A ransomware attack on the City of Columbus exposed sensitive data of half a million residents, highlighting the heightened risk of ransomware in municipal systems.LastPass Phishing Scam Targets Customer Data
Scammers impersonating LastPass support staff have been contacting users, seeking to access customer devices under the guise of support. LastPass has issued a warning, urging users to be vigilant and avoid fake support contacts.
Compliance
White House Outlines AI’s Role in National Security
The recent National Security Memorandum underscores the U.S. government’s commitment to securing the AI supply chain. Federal agencies are tasked with protecting AI from cyberattacks and sharing timely threat intelligence across sectors.15 Tech Companies Achieve SASE Certification
Fifteen companies earned Secure Access Service Edge (SASE) certification, establishing their solutions as compliant with new security and network standards for cloud applications. SASE certification is crucial for enhancing network security frameworks.NIST’s Post-Quantum Cryptography Standards Introduced
In light of advancements in quantum computing, NIST has introduced new cryptography standards aimed at preparing for post-quantum cybersecurity challenges. This is a critical step in protecting future data integrity.OWASP Expands AI Security Guidance
Responding to concerns over deepfake and AI-based attacks, OWASP has issued updated guidelines for securing AI systems, helping organizations develop better defenses against AI-generated threats.Siemens and Rockwell Drive ICS Security Standards
Siemens and Rockwell Automation are actively encouraging their clients to implement ICS security upgrades, despite client hesitation. Their efforts aim to raise compliance standards and protect critical industrial systems.
Let's Build Trust
Work with us or follow along:
Cycore, builds enterprise-grade security, privacy and compliance programs for the modern organization. Partner with us.
Follow us on LinkedIn for security, privacy & compliance updates!
How else can we help? Feedback? Have a question? Reply to this email.
Know someone who would like this email? Forward it to a friend...
Your security & compliance ally,
Cycore Team
