secures $37M Series A to preempt Digital Impersonation & ATO scams   🎉

PODCAST

The MemcycoFM Show: Episode 21

Welcome to another episode of The MemcycoFM Show. Today's topic is based off our recent press release announcement, where Memcyco raised $37M to combat advanced digital impersonation & ATO scams and fraud.

Why You Should Watch

The oversubscribed round was led by new investors NAventures, the corporate venture arm of National Bank of Canada, E. León Jimenes, and Pags Group, the family office of Steve Pagliuca, with participation from existing investors Capri Ventures and Venture Guides. The capital will fuel the global expansion of Memcyco’s agentless platform, which is rapidly replacing reactive fraud defenses with preemptive protection, making digital trust a reality for customers of the world’s largest brands.

Enterprises no longer have the luxury of reacting after fraud occurs. As impersonation and ATO attacks shift earlier in the attack lifecycle, security teams need visibility and control before damage is done.

This funding milestone reflects a broader industry shift toward preemptive protection, lower customer friction, and measurable impact.

Why the Attack Has Moved Earlier

Attackers no longer wait for login pages. Search ads, cloned sites, and social impersonation allow fraud to begin long before traditional controls engage, shrinking the margin for response.

Outline of a lightbulb with a pink lock symbol inside angled brackets, representing secure coding or cybersecurity innovation, showcased by Memcyco at RSA Conference 2025.

Why Detection Alone Is No Longer Enough

Most security tools surface signals too late, after credentials are already compromised. Effective defense now requires intervention during deception, not after authentication fails.

Outline of three people with a pink shield featuring a checkmark in front, representing group security or protected users—showcasing the focus on safety at Memcyco at RSA Conference 2025.

What Preemptive Protection Enables

By identifying victims and attack paths in real time, organizations can disrupt fraud as it unfolds, reduce exposure, and protect digital trust without adding friction for customers.

Listen to the full podcast episode below.

This website uses cookies to ensure you get the best experience on our site. By continuing, you agree to our privacy policy.