Another Day, Another Supply Chain Security Problem

Koi Security just raised $48 million from Battery Ventures and others to tackle a problem that makes security teams want to drink heavily: developers installing random shit on corporate networks.

The DC-based startup, founded by Unit 8200 veterans, targets the security nightmare of unmanaged software that traditional EDR tools completely miss. They've scaled to 500K+ endpoints and landed Fortune 50 clients, which suggests the problem is real and widespread.

EDR tools weren't designed for this modern shitshow where developers install random packages like they're collecting Pokemon cards.

The VSCode Marketplace Discovery That Launched Koi

Koi's origin story demonstrates the severity of modern software supply chain risks. The founding team discovered a significant security vulnerability in how enterprises manage software through the VSCode Marketplace, Microsoft's central hub for Visual Studio Code extensions.

To prove the risk, they created a fake extension called "Darcula Official" - designed to mimic a popular dark theme but secretly steal source code and machine details. Within a week, this proof-of-concept extension had infected over 300 organizations worldwide, including multibillion-dollar companies and a national court network.

"Enterprises have no real control over the software flowing into their environments," explained Amit Assaraf, co-founder and CEO of Koi. "Packages, AI models, MCPs, and extensions are now critical parts of the stack, yet they remain invisible to traditional tools."

Beyond Traditional Binary Security

Software Supply Chain Security Visualization

Traditional endpoint security focuses on compiled binary software, but modern enterprises increasingly rely on noncompiled software including code, operating system packages, containers, extensions, AI models, and model context protocol (MCP) services. These components operate at higher layers but retain the ability to access sensitive information like passwords, authorization keys, and proprietary code.

Koi's Supply Chain Gateway serves as a central checkpoint for all software accessing enterprise endpoints. The platform provides unified software inventory, real-time risk analysis, automated policy enforcement, and preventative fixes to block noncompliant components before they reach endpoints.

AI-Powered Threat Detection Engine

The company developed Wings, an AI-driven security engine that uses threat intelligence, classification, and sandboxing to identify threats that traditional scanners overlook. This approach enables Koi to detect sophisticated supply chain attacks that exploit the trust relationships inherent in modern software distribution.

From their initial VSCode research, Koi developed ExtensionTotal, a product specifically focused on detecting risky code editor extensions. This formed the foundation for their broader endpoint security platform, which now covers the entire enterprise software ecosystem.

The Inevitable Enterprise Wake-Up Call

The rapid enterprise adoption suggests security teams finally realize they have no fucking clue what's running on their networks. Traditional EDR solutions were built for an era when IT controlled all software installations. Now developers download whatever they need from npm, pip, VSCode marketplace, and random GitHub repos.

"We've built a product that enables organizations to curate what software is allowed in," says Assaraf. That's the diplomatic way of saying "we help you stop developers from accidentally installing malware."

Of course, knowing you need supply chain security and actually implementing it are two different things. Most enterprises will wait until they get pwned by a malicious npm package, then panic-buy whatever security vendor can fix it fastest.

The real question is whether enterprises will pay for proactive security or wait for the inevitable breach like they always do.

The Real Problem: Your Developers Are Installing Everything

So Koi Security raised $48 million to solve what security teams have been screaming about for years: developers treat the internet like their personal software buffet, and nobody knows what the hell is running on company machines.

Every Package Manager Is a Security Nightmare

Remember when enterprise software came on CDs and took months to approve? Now developers just `npm install whatever-seems-useful` and call it a day. Here's what's streaming into corporate networks:

Every single one can access your secrets, steal your code, or phone home with whatever they want. Traditional security tools have no fucking clue any of this is happening.

Why Your EDR Is Useless Here

EDR tools were built for the Windows XP era when all software was signed executables from known vendors. They're completely blind to:

Koi basically built what EDR should have been if anyone had seen this shitshow coming.

The VSCode Hack That Proved Everything

VSCode Extension Marketplace Interface

Remember that fake "Darcula Official" extension Koi's team created? It infected 300 organizations in one week. Not because enterprises are stupid, but because the entire marketplace trust model is broken.

Developers see a dark theme extension with a familiar name and install it without thinking. Why wouldn't they? Microsoft's marketplace makes everything look official and safe. Except it's not.

That one experiment proved that:

  • Name squatting works - fake official extensions fool everyone
  • Marketplace vetting is garbage - malicious code gets through easily
  • Developers trust blindly - if it's in the store, it must be safe
  • Security tools are useless - traditional scanners detect nothing

Why This Is Actually Getting Funded

Koi's timing is perfect because:

SolarWinds scared the shit out of everyone: When Russian hackers owned half of corporate America through a software update, boards finally started caring about supply chain security.

Log4j broke the internet: One vulnerable Java library in everything suddenly made supply chain risks real and immediate.

Compliance requirements: Finance and healthcare regulators are starting to ask uncomfortable questions about software provenance.

AI models everywhere: Companies are downloading AI models from random internet sources and running them in production. What could go wrong?

The Wings AI Thing Actually Sounds Useful

Koi's Wings engine does threat detection on packages before they hit your network. It analyzes code, checks publisher reputation, and sandboxes suspicious stuff to see what it actually does.

That's genuinely useful because:

  • Manual review is impossible - developers install hundreds of dependencies
  • Static analysis isn't enough - malicious code can be obfuscated or delayed
  • Reputation matters - packages from sketchy publishers should get extra scrutiny
  • Behavioral analysis works - running code in a sandbox reveals actual intent

The Enterprise Reality Check

With $48 million, Koi can expand beyond just catching malicious packages. They're probably looking at:

  • Container security - because Docker images are also a shitshow
  • CI/CD integration - catch problems before they hit production
  • AI model governance - because enterprises are downloading language models like Pokemon cards

But here's the real question: will enterprises actually use this proactively, or wait until they get pwned and then panic-buy whatever fixes the immediate problem?

Based on how enterprise security usually works, my money's on panic-buying after the breach.

Koi Security Funding FAQ

Q

What is Koi Security's core product?

A

Koi Security offers Supply Chain Gateway, a platform that acts as a central checkpoint for all software accessing enterprise endpoints. It provides unified software inventory, real-time risk analysis, automated policy enforcement, and preventative fixes to block noncompliant components.

Q

How much funding did Koi Security raise?

A

Koi raised $48 million across seed and Series A rounds, including a $38 million Series A led by Battery Ventures, Team8, Picture Capital, and NFX, with participation from Cerca Partners.

Q

What types of software does Koi Security protect against?

A

Koi focuses on noncompiled software including code packages, operating system packages, containers, browser extensions, code editor extensions, AI models, and Model Context Protocol (MCP) services that traditional security tools often miss.

Q

What is the "Darcula Official" experiment?

A

Koi's founders created a fake VSCode extension called "Darcula Official" that secretly stole source code and machine details. Within a week, it infected over 300 organizations worldwide, proving the severity of software supply chain vulnerabilities.

Q

How many endpoints does Koi Security currently protect?

A

Koi has rapidly scaled to secure more than 500,000 endpoints worldwide and is already integrated by Fortune 50 companies including major financial institutions and technology companies.

Q

What is Koi's Wings AI engine?

A

Wings is Koi's AI-driven security engine that uses threat intelligence, classification, and sandboxing to identify threats that traditional scanners may overlook, providing automated risk assessment and threat detection.

Q

Who founded Koi Security?

A

Koi was founded in 2024 by veterans of Israel's elite Unit 8200 cyber unit, led by co-founder and CEO Amit Assaraf.

Q

What is ExtensionTotal?

A

ExtensionTotal is Koi's product specifically designed to detect risky extensions installed in code editors. It was developed from their initial VSCode marketplace research and informed their broader endpoint security platform.

Q

Why can't traditional EDR solutions handle modern software threats?

A

Traditional Endpoint Detection and Response (EDR) tools focus on compiled binary software but struggle with modern noncompiled software that operates at higher layers while still having access to sensitive data and systems.

Q

What makes Koi's approach unique?

A

Koi provides proactive security by curating what software is allowed into enterprise environments and blocking risky, malicious, or noncompliant components before they reach endpoints, rather than detecting threats after they're already installed.

Q

Which major companies use Koi Security?

A

While specific names aren't disclosed, Koi protects Fortune 50 companies including major financial enterprises and technology companies across various industries.

Q

What will Koi do with the new funding?

A

The $48 million will be used to accelerate product development, expand global customer reach, and enhance their AI-powered threat detection capabilities to address the growing software supply chain security market.

Related Tools & Recommendations

compare
Recommended

Redis vs Memcached vs Hazelcast: Production Caching Decision Guide

Three caching solutions that tackle fundamentally different problems. Redis 8.2.1 delivers multi-structure data operations with memory complexity. Memcached 1.6

Redis
/compare/redis/memcached/hazelcast/comprehensive-comparison
100%
tool
Recommended

Memcached - Stop Your Database From Dying

competes with Memcached

Memcached
/tool/memcached/overview
62%
tool
Recommended

Docker Scout - Find Vulnerabilities Before They Kill Your Production

Docker's built-in security scanner that actually works with stuff you already use

Docker Scout
/tool/docker-scout/overview
61%
troubleshoot
Recommended

Docker Permission Denied on Windows? Here's How to Fix It

Docker on Windows breaks at 3am. Every damn time.

Docker Desktop
/troubleshoot/docker-permission-denied-windows/permission-denied-fixes
61%
troubleshoot
Recommended

Docker Daemon Won't Start on Windows 11? Here's the Fix

Docker Desktop keeps hanging, crashing, or showing "daemon not running" errors

Docker Desktop
/troubleshoot/docker-daemon-not-running-windows-11/windows-11-daemon-startup-issues
61%
howto
Recommended

How to Reduce Kubernetes Costs in Production - Complete Optimization Guide

integrates with Kubernetes

Kubernetes
/howto/reduce-kubernetes-costs-optimization-strategies/complete-cost-optimization-guide
61%
integration
Recommended

Kafka + MongoDB + Kubernetes + Prometheus Integration - When Event Streams Break

When your event-driven services die and you're staring at green dashboards while everything burns, you need real observability - not the vendor promises that go

Apache Kafka
/integration/kafka-mongodb-kubernetes-prometheus-event-driven/complete-observability-architecture
61%
tool
Recommended

Debug Kubernetes Issues - The 3AM Production Survival Guide

When your pods are crashing, services aren't accessible, and your pager won't stop buzzing - here's how to actually fix it

Kubernetes
/tool/kubernetes/debugging-kubernetes-issues
61%
alternatives
Recommended

Tired of GitHub Actions Eating Your Budget? Here's Where Teams Are Actually Going

integrates with GitHub Actions

GitHub Actions
/alternatives/github-actions/migration-ready-alternatives
56%
alternatives
Recommended

GitHub Actions Alternatives That Don't Suck

integrates with GitHub Actions

GitHub Actions
/alternatives/github-actions/use-case-driven-selection
56%
integration
Recommended

GitHub Actions + Docker + ECS: Stop SSH-ing Into Servers Like It's 2015

Deploy your app without losing your mind or your weekend

GitHub Actions
/integration/github-actions-docker-aws-ecs/ci-cd-pipeline-automation
56%
integration
Recommended

Stop Waiting 3 Seconds for Your Django Pages to Load

integrates with Redis

Redis
/integration/redis-django/redis-django-cache-integration
56%
tool
Recommended

Django Production Deployment - Enterprise-Ready Guide for 2025

From development server to bulletproof production: Docker, Kubernetes, security hardening, and monitoring that doesn't suck

Django
/tool/django/production-deployment-guide
56%
howto
Recommended

Deploy Django with Docker Compose - Complete Production Guide

End the deployment nightmare: From broken containers to bulletproof production deployments that actually work

Django
/howto/deploy-django-docker-compose/complete-production-deployment-guide
56%
troubleshoot
Popular choice

Redis Ate All My RAM Again

Learn how to optimize Redis memory usage, prevent OOM killer errors, and combat memory fragmentation. Get practical tips for monitoring and configuring Redis fo

Redis
/troubleshoot/redis-memory-usage-optimization/memory-usage-optimization
53%
howto
Popular choice

Fix Your FastAPI App's Biggest Performance Killer: Blocking Operations

Stop Making Users Wait While Your API Processes Heavy Tasks

FastAPI
/howto/setup-fastapi-production/async-background-task-processing
49%
alternatives
Popular choice

Your MongoDB Atlas Bill Just Doubled Overnight. Again.

Fed up with MongoDB Atlas's rising costs and random timeouts? Discover powerful, cost-effective alternatives and learn how to migrate your database without hass

MongoDB Atlas
/alternatives/mongodb-atlas/migration-focused-alternatives
46%
tool
Recommended

Apache Kafka - The Distributed Log That LinkedIn Built (And You Probably Don't Need)

compatible with Apache Kafka

Apache Kafka
/tool/apache-kafka/overview
46%
review
Recommended

Kafka Will Fuck Your Budget - Here's the Real Cost

Don't let "free and open source" fool you. Kafka costs more than your mortgage.

Apache Kafka
/review/apache-kafka/cost-benefit-review
46%
compare
Popular choice

Deno 2 vs Node.js vs Bun: Which Runtime Won't Fuck Up Your Deploy?

The Reality: Speed vs. Stability in 2024-2025

Deno
/compare/deno/node-js/bun/performance-benchmarks-2025
44%

Recommendations combine user behavior, content similarity, research intelligence, and SEO optimization