Regulus Cyber
GNSS spoofing counter-drone systems and cybersecurity software solutions
Vitality Radar
Pillar Analysis
Strategic Assessment
Strategic Vector
Regulus Cyber specializes in software-based cybersecurity for GNSS spoofing and jamming, targeting counter-unmanned systems (C-UxS) in defense applications with products like Ring C-UxS and Pyramid GNSS deployed operationally.
Efficiency Ratio
High innovation output from a small Israeli team with hundreds of systems deployed, indicating strong resource efficiency in niche defense tech development.
Evidence Signals
Released Regulus Pyramid GNSS, a software-only solution protecting GPS receivers from spoofing attacks without additional hardware.
View sourceDeveloped Ring C-UxS system using GNSS manipulation, with hundreds of systems deployed across various use cases.
View sourceNamed as Challenger in CB Insights ESP matrix for Security robot & drone solutions among 14 companies.
View sourceIMOD supplier status for GNSS security technologies since 2016, demonstrating operational success.
View sourceCollaborates with industry leaders in Counter-Drone Defense for tailored solutions.
View sourceConducts experiments like spoofing a Tesla semi-autonomous vehicle to demonstrate product efficacy.
View sourceLaunched Pyramid GPS SP module and Pyramid CSM for sensor protection in drones and autonomous vehicles.
View source- About
- Regulus Cyber provides software-only GNSS cybersecurity solutions protecting against spoofing and jamming attacks with Pyramid GNSS technology offering detection and mitigation capabilities. The company also develops Ring counter-UAS systems using spoofing techniques for Class 1 and Class 2 commercial drone threats. With 100% success in spoofing GNSS receivers and systems, Regulus has combat-proven deployments protecting borders and critical infrastructure with autonomous RF detection capabilities.
- Relevancy
- Provides software-based GNSS cybersecurity and counter-drone systems using spoofing techniques, protecting critical navigation infrastructure from jamming/spoofing attacks while enabling soft-kill neutralization of hostile UAS through RF protocol manipulation.
- Tags
- #cyberrf #autonomous #cuas #jamming #protocolmanipulation