Friday, May 23, 2025
HomeAcquisitionResilience to Acquire BreachQuest for an undisclosed price

Resilience to Acquire BreachQuest for an undisclosed price

Published on

SIEM as a Service

Follow Us on Google News

In a strategic move to enhance its cyber risk management capabilities, Resilience has announced the acquisition of BreachQuest, an innovative incident response technology firm.

This acquisition marks a significant step in Resilience’s efforts to combat the escalating threat of Business Email Compromise (BEC) attacks and other cyber threats.

Strengthening Defenses Against Cyber Threats

BreachQuest is renowned for its cutting-edge platform that integrates seamlessly into cloud office systems, providing invaluable insights for incident forensics and expediting response efforts.

- Advertisement - Google News
Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks .

Integrating BreachQuest’s technology into Resilience’s cyber risk management software is expected to significantly enhance incident response mechanisms, particularly against BEC attacks, which have become a significant concern in the digital landscape.

BEC attacks have increased, with the U.S. Government’s Internet Crime Complaint Center (IC3) reporting losses exceeding $2.7 billion in 2022.

In 2023, these incidents ranked as the second leading cause of financial loss for Resilience clients, highlighting the urgent need for advanced risk management strategies.

Shaun Gordon, co-founder and CEO of BreachQuest, expressed pride in his team’s work and enthusiasm for scaling their mission through integration with Resilience’s software.

“Resilience shares our mission in helping improve a client’s cyber resilience and lowering the impact of costly cyber incidents,” Gordon stated, emphasizing the synergy between the two companies’ approaches to incident management.

Vishaal “V8” Hariprasad, co-founder and CEO of Resilience, highlighted the growing sophistication of cybercriminals, particularly with the advent of generative AI technologies.

“Cybercriminals are becoming smarter and faster in executing business email compromise, and with the addition of tools like generative AI, the threat is only growing,” Hariprasad said.

He expressed excitement about welcoming BreachQuest to Resilience, noting that their team and technology have been proven to reduce the financial impact of their clients’ cyber risks.

Enhancing Incident Preparedness

The acquisition of BreachQuest is part of Resilience’s broader strategy to adapt to evolving cyber threats and enhance incident preparedness.

This move follows a period of significant expansion for Resilience, underscoring the company’s commitment to leveraging data and technology to stay ahead of cyber adversaries.

Tim Riley, SVP of Business Development at Resilience, highlighted client benefits, emphasizing the synergy between BreachQuest’s platform and Resilience’s proactive incident management approach.

This collaboration is expected to reduce the financial impact of cyber threats for clients, further enhancing their security posture in the face of evolving digital risks.

In conclusion, acquiring BreachQuest by Resilience significantly advances the fight against cyber threats.

By integrating BreachQuest’s innovative technology into its cyber risk management software, Resilience aims to provide its clients with enhanced protection against the growing menace of BEC attacks and other cyber risks.

This strategic move demonstrates both companies’ shared commitment to improving cyber resilience and lowering the impact of costly cyber incidents.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...