San Juan, Puerto Rico, February 10th, 2025, Chainwire
Drosera, an innovative Ethereum-aligned security automation layer, positioned as the immune system for Ethereum has closed its latest funding round bringing the total raised to $4.75 million. The raise, which was led by Greenfield Capital, saw participation from several prominent funds including Anagram, Paper Ventures, Arrington Capital, UDHC and Pulsar. Multiple angel investors also committed capital, among them Jan Baeriswyl, Luke Hackett, Felix Lutsch, Max from DeFine Logic Labs, Diogo Costa, Yaroslav Pshenitsyn, Peter Kim, Mara Schmidt, Daniel and Abhishek from Swell Labs, Anuj Shankar, and Collin Myers.
“We are thrilled to have the support of so many esteemed investors as we strive to set a new and elevated standard for protocol security,” said Samuel Glenn (Bobafetador), co-founder and CTO of Drosera. “Drosera acts as Ethereum’s immune system by arming protocols with the ability to detect and neutralize threats before they can cause harm. By significantly reducing the risk of exploits, we are building a more resilient and trustworthy DeFi ecosystem.”
With over 3,700 web3 protocols having fallen victim to exploits enabled by security failings and vulnerabilities, Drosera offers a cutting-edge solution.
“This raise is a pivotal milestone for Drosera as we continue our mission to redefine security standards within the decentralized finance space,” said Fernando Reyes (FDR), Founder and CEO of Drosera.
“This funding will enable us to scale and push the boundaries of what’s possible in protocol security, ensuring that every project built on Ethereum can operate with greater resilience against the ever-evolving landscape of cyber threats. Honing in our mission to actualize a Web3 without Compromise”
Drosera’s innovative approach, modeled as Ethereum’s immune system, enables protocols to delegate security infrastructure to a decentralized network of node operators. This system functions similarly to antibodies in a biological immune system, identifying and neutralizing threats in real time to safeguard the network. It works as follows:
• Protocols create
Go to Source to See Full Article
Author: Crypto Daily™