Ocean Raises $28M for AI Email Security Platform to Combat Phishing
Ocean, an agentic email security platform, raised $28 million to fight AI-powered phishing. Its AI analyzes email context to detect fraud and impersonation.
Ocean, an email security startup, announced it has raised $28 million in funding. The company's platform uses artificial intelligence to analyze the context of incoming emails, aiming to detect sophisticated phishing and impersonation attempts. The funding round was led by a prominent venture capital firm, with participation from existing investors.
The platform employs what Ocean calls "agentic" AI, which goes beyond traditional email filtering. Instead of relying solely on known threat signatures or simple rule-based detection, Ocean's system examines the full context of each message, including sender behavior, language patterns, and relationship dynamics. This approach is designed to catch advanced social engineering attacks that often bypass conventional security measures.
Ocean's technology was developed by a founder with a background in cybersecurity research, including work on systems similar to Israel's Iron Dome missile defense. The founder's experience in high-stakes threat detection informed the design of Ocean's AI, which aims to adapt to evolving attack techniques in real time.
The company reports that its platform can identify subtle indicators of fraud, such as unusual requests for sensitive information or slight deviations in communication style. Ocean claims its AI reduces false positives compared to traditional email security tools, allowing legitimate emails to reach users without interruption.
Ocean plans to use the new funding to expand its engineering team and accelerate product development. The company also intends to scale its sales and marketing efforts to reach more enterprise customers. Ocean's platform integrates with major email providers like Microsoft 365 and Google Workspace.
The $28 million funding round brings Ocean's total raised to date to $35 million. The company did not disclose its valuation. Ocean's customers include several Fortune 500 companies, though the startup declined to name them.
Ocean's platform is available now for businesses of all sizes. Pricing is based on the number of users and starts at $5 per user per month. The company offers a free trial for prospective customers.
"Our mission is to make email safe for everyone," said Ocean's founder and CEO in a statement. "With this funding, we can accelerate our work to stop AI-powered phishing attacks before they cause harm."
Discord Rolls Out End-to-End Encryption for All Voice and Video Calls
Discord has enabled end-to-end encryption for all voice and video calls, ensuring that no one, including Discord, can access the content. The feature is now available to all users across platforms.
Discord announced on Tuesday that it has implemented end-to-end encryption for all voice and video calls on its platform. The move affects the company's hundreds of millions of users worldwide, providing a significant privacy upgrade. The encryption ensures that call content remains scrambled and inaccessible to Discord or any third parties.
The feature is now live across all platforms, including desktop, web, and mobile apps. Users do not need to take any action to enable it, as the encryption is applied automatically to every voice and video call. Discord confirmed that the encryption covers both one-on-one and group calls.
Discord's encryption protocol is based on the Signal Protocol, a widely respected standard used by messaging apps like Signal and WhatsApp. The company stated that the encryption keys are generated and stored locally on users' devices, preventing Discord from accessing them. This means that even if Discord were compelled to hand over call data, it would be unable to decrypt it.
The rollout follows years of development and testing. Discord first introduced end-to-end encryption for voice calls in a limited beta in 2022, but the feature was not widely available. The company has now expanded it to all users after refining the implementation and ensuring performance stability.
Privacy advocates have long called for Discord to adopt end-to-end encryption, given the platform's popularity among gamers and communities that discuss sensitive topics. The company's previous stance was that encryption could hinder its ability to moderate harmful content, such as child abuse material. However, Discord has since developed alternative moderation tools that do not rely on accessing call content.
Discord emphasized that the encryption does not affect its ability to moderate text-based content, which remains subject to scanning for policy violations. The company uses machine learning and user reports to detect abusive behavior in text channels and direct messages. Voice and video calls, however, are now fully protected.
The update is available immediately for all users on Discord's latest app versions. Users on older versions may need to update their apps to benefit from the encryption. Discord recommends keeping apps up to date to ensure the best security and performance.
Discord's announcement comes amid a broader industry push toward stronger encryption. Competitors like Telegram and WhatsApp have offered end-to-end encryption for calls for years. With this move, Discord closes a major gap in its security offerings, potentially attracting privacy-conscious users.
"We believe that privacy is a fundamental right, and we are committed to protecting our users' conversations," a Discord spokesperson said in a statement. "End-to-end encryption for voice and video calls is a critical step in that commitment."
NYC Health and Hospitals breach exposes fingerprints, medical data of 1.8M
New York City's public healthcare system confirmed hackers stole personal and medical data, including fingerprints, affecting at least 1.8 million individuals. The breach is among the largest recorded in 2026.
New York City Health and Hospitals Corporation disclosed a data breach that compromised the personal and medical information of at least 1.8 million people. The attack, which occurred earlier this year, also exposed biometric data including fingerprints, according to the organization's notification filed with state regulators.
The breach was discovered in late February, though the intrusion may have begun months earlier. Hackers gained access to systems containing patient records, treatment histories, and insurance details. The compromised biometric data includes fingerprint scans used for identity verification within the healthcare system.
NYC Health and Hospitals operates the city's public hospitals and clinics, serving a large population of low-income and uninsured residents. The organization stated that the attackers exfiltrated data from a third-party vendor's system used for patient management. The vendor, whose name was not disclosed, is cooperating with the investigation.
Affected individuals are being notified by mail, and the healthcare system is offering free credit monitoring and identity theft protection services. The breach is one of the largest involving biometric data, raising concerns about the irreversible nature of compromised fingerprints.
New York State Attorney General Letitia James has opened an investigation into the incident. The healthcare system faces potential lawsuits and regulatory fines under state and federal data protection laws, including HIPAA.
NYC Health and Hospitals has since implemented additional security measures, including multi-factor authentication and enhanced monitoring. The organization urged affected patients to remain vigilant for signs of identity theft or medical fraud.
The breach notification was filed with the Maine Attorney General's office, as required by state law, and posted publicly on April 15, 2026. The healthcare system said it is working with law enforcement and cybersecurity experts to determine the full scope of the attack.
Grafana Labs confirms source code theft, declines ransom demand
Grafana Labs disclosed that hackers accessed and stole its source code, threatening to release it unless a ransom is paid. The company stated it will not comply with the demand.
Grafana Labs, the company behind the popular open source observability platform, revealed that attackers breached its systems and exfiltrated its proprietary source code. The incident came to light after the threat actors contacted the company with a ransom demand, threatening to publish the stolen code if payment was not made.
The company confirmed the breach in a security advisory, stating that the attackers gained access to its internal code repositories. Grafana Labs emphasized that the stolen code includes proprietary components that are not part of the open source project. The company declined to pay the ransom, citing its commitment to transparency and the belief that paying would not guarantee the data's safety.
Grafana Labs has not disclosed the exact method of intrusion or the number of repositories affected. However, the company noted that it has since rotated credentials, reviewed access controls, and implemented additional security measures. The investigation is ongoing, with assistance from external cybersecurity experts.
The stolen code does not include customer data or production systems, according to Grafana Labs. The company reassured users that the open source Grafana platform remains unaffected, as its code is already publicly available. The proprietary code, which includes enterprise features and integrations, is the primary target of the extortion attempt.
This incident highlights the growing trend of ransomware groups targeting software supply chains and source code repositories. By threatening to leak proprietary code, attackers aim to pressure companies into paying ransoms, often with the added risk of exposing intellectual property or trade secrets.
Grafana Labs has not received any indication that the stolen code has been published or misused. The company is monitoring for any unauthorized distribution and has notified relevant authorities. It also advised customers to remain vigilant and report any suspicious activity related to Grafana software.
The company reiterated that it will not engage with the attackers or pay the ransom. Grafana Labs stated that its focus remains on securing its infrastructure and ensuring the integrity of its products. Users are encouraged to update to the latest versions of Grafana and follow best security practices.
Grafana Labs has not provided a timeline for when the investigation will conclude. The company plans to share more details as they become available, emphasizing its commitment to transparency throughout the process.








