Regulus Cyber
GNSS spoofing counter-drone systems and cybersecurity software solutions
Vitality Radar
Pillar Analysis
Strategic Assessment
Strategic Vector
Regulus Cyber specializes in software-based cybersecurity for GNSS spoofing and jamming, targeting counter-unmanned systems (C-UxS) in defense applications with products like Ring C-UxS and Pyramid GNSS deployed operationally.
Efficiency Ratio
High innovation output from a small Israeli team with hundreds of systems deployed, indicating strong resource efficiency in niche defense tech development.
Evidence Signals
Released Regulus Pyramid GNSS, a software-only solution protecting GPS receivers from spoofing attacks without additional hardware.
View sourceDeveloped Ring C-UxS system using GNSS manipulation, with hundreds of systems deployed across various use cases.
View sourceNamed as Challenger in CB Insights ESP matrix for Security robot & drone solutions among 14 companies.
View sourceIMOD supplier status for GNSS security technologies since 2016, demonstrating operational success.
View sourceCollaborates with industry leaders in Counter-Drone Defense for tailored solutions.
View sourceConducts experiments like spoofing a Tesla semi-autonomous vehicle to demonstrate product efficacy.
View sourceLaunched Pyramid GPS SP module and Pyramid CSM for sensor protection in drones and autonomous vehicles.
View source- About
- Regulus Cyber provides software-only GNSS cybersecurity solutions protecting against spoofing and jamming attacks with Pyramid GNSS technology offering detection and mitigation capabilities. The company also develops Ring counter-UAS systems using spoofing techniques for Class 1 and Class 2 commercial drone threats. With 100% success in spoofing GNSS receivers and systems, Regulus has combat-proven deployments protecting borders and critical infrastructure with autonomous RF detection capabilities.
- Relevancy
- Critical GNSS spoofing technology provider addressing dual counter-autonomous requirements: offensive spoofing for drone neutralization and defensive protection for autonomous systems. Their Ring C-UAS systems neutralize autonomous drones by manipulating their navigation systems, while Pyramid GNSS protects friendly autonomous platforms from navigation attacks. This dual capability - attacking hostile autonomous systems while protecting friendly ones - positions them as essential GNSS spoofing technology for comprehensive counter-autonomous operations and autonomous system protection.
- Tags
- #cyberrf #autonomous #cuas #jamming #protocolmanipulation