CybersecurityApril 19, 2026

Artemis Raises $70M Series A to Counter AI‑Powered Cyber Threats

Artemis secures $70M Series A led by Felicis to expand real‑time threat detection for AI‑driven attacks. Other startups also raise funds.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Artemis Raises $70M Series A to Counter AI‑Powered Cyber Threats

**TL;DR:** Artemis secured a $70 M Series A led by Felicis to expand its real‑time threat detection and automated response platform for AI‑powered cyber attacks. The round brings total seed and Series A capital to $70 M, while other startups Joyful Health and Traza also announced fresh funding.

Context Cyber adversaries are increasingly using generative AI to craft convincing phishing lures, automate vulnerability discovery, and evade traditional defenses. Enterprises need tools that can detect anomalous model behavior and respond in seconds rather than hours. Artemis, founded in 2025 by Shachar Hirshberg and Dan Shiebler, offers a platform that correlates telemetry from endpoints, cloud workloads, and AI‑specific logs to flag malicious activity.

Key Facts The $70 M Series A was led by Felicis, with participation from First Round Capital, Brightmind, Theory VC, Lockstep, and notable cybersecurity founders from Abnormal AI and Demisto. Artemis emerged from stealth with a combined $70 M in seed and Series A funding. In the same week, Joyful Health raised a $17 M Series A led by CRV to improve medical claims processing, and Traza secured a $2.1 M Pre‑Seed round led by Base10 Partners for AI‑driven procurement automation.

What It Means The investment signals confidence that AI‑focused detection will become a core component of enterprise security stacks. Artemis plans to use the capital to expand its engineering team, integrate large‑language‑model anomaly detection, and expand go‑to‑market efforts across North America and Europe. For defenders, the funding may accelerate availability of tools that map AI abuse to MITRE ATT&CK techniques such as T1566.002 (Phishing: Spearphishing Link) and T1059.007 (JavaScript).

What Defenders Should Do - Enable logging of AI service API calls and monitor for unusual prompt patterns indicative of injection or model‑stealing attempts. - Deploy detection rules for MITRE ATT&CK T1059.003 (Windows Command Shell) and T1070.004 (File Deletion) that often follow successful AI‑driven credential theft. - Apply vendor‑provided patches for known vulnerabilities in LLM inference servers (e.g., CVE‑2024‑21592) and enforce least‑privilege access to model endpoints. - Subscribe to threat‑intel feeds that tag AI‑generated phishing campaigns and update email gateway signatures accordingly.

Watch for Artemis’s upcoming product updates and how enterprises adopt AI‑specific detection controls in the next six months.

TweetLinkedIn

Reader notes

Loading comments...