{"id":6040,"date":"2025-12-02T13:14:28","date_gmt":"2025-12-02T13:14:28","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=6040"},"modified":"2025-12-02T13:14:28","modified_gmt":"2025-12-02T13:14:28","slug":"cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=6040","title":{"rendered":"Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and prevent threats, <a href=\"http:\/\/www.frenetik.us\/\" target=\"_blank\" rel=\"noopener\">Frenetik<\/a>, a Maryland cyber startup, is betting on something simpler: making sure attackers don\u2019t know what defenders know.<\/p>\n<p>The company emerged today with a fundamentally different approach using novel cyber deception and a newly issued U.S. patent to back it.<\/p>\n<p>\u201cThe industry has turned cybersecurity into a compute and analysis war,\u201d said founder Hans Ismirnioglou. \u201cBigger models, more data, faster analysis. But you can\u2019t out-compute or out-analyze an adversary forever. We\u2019re not trying to. We\u2019re exploiting information asymmetry.\u201d<\/p>\n<p>Traditional deception tools deploy fake systems, wait for attackers to find them, and hope they interact. Frenetik\u2019s patented \u201cDeception In-Use\u201d technology (U.S. Patent 12,463,981 \u2013 \u201cSystems and Methods for Counter-Reconnaissance in Cloud Infrastructure to Disrupt Adversarial Targeting\u201d) takes a different path: it continuously rotates actually used identities and resources across Microsoft Entra (M365), AWS, Google Cloud, and on-premises environments. The critical details of who changed, what changed, when, where, and how travel through out-of-band channels accessible only to trusted parties.<\/p>\n<p>Defenders stay informed. Attackers work from stale intelligence. \u201cAdversaries, especially AI-driven ones, build models based on reconnaissance. They assume the environment they mapped earlier is the environment they\u2019ll exploit today,\u201d Ismirnioglou explained. \u201cWe break that assumption without needing a bigger GPU cluster by simply depriving them of easily discoverable information.\u201d<\/p>\n<p>Users can think of it as musical chairs for hackers: by the time they figure out where to sit, everything has moved\u2014and only defenders know which chairs are real and which have become traps.<\/p>\n<p>The technology transforms existing deception tools from passive traps into active ones. When Frenetik rotates real resources, attackers following stale intelligence get funneled straight into honeypots and decoys, supercharging interaction rates with classic deception elements that previously only hoped to look real. Unlike solutions requiring extensive tuning or analyst oversight, Frenetik works because attackers simply lack the information needed to know the difference.<\/p>\n<p>\u201cI want the adversary to have to continuously put a dedicated body onto every target they go after \u2013 no more free lunches or easy days for America\u2019s adversaries,\u201d says Ismirnioglou.<\/p>\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<\/div>\n<p><strong>About Frenetik<\/strong><\/p>\n<p>Frenetik, a Maryland-based cybersecurity startup, just emerged from stealth with a new approach: instead of flooding defenders with more data, it starves attackers of the information they need to move. Focused on measurable security outcomes, and pricing transparency, Frenetik is built to tip the balance of power by denying adversaries trustworthy insight into targeted environments. Frenetik offers a free community version at <a href=\"http:\/\/www.frenetik.us\/\" target=\"_blank\" rel=\"noopener\">www.frenetik.us<\/a>.<\/p>\n<h5 class=\"wp-block-heading\"><strong>Contact<\/strong><\/h5>\n<p><strong>Founder<\/strong><\/p>\n<p><strong>Hans Ismirnioglou<\/strong><\/p>\n<p><strong>Frenetik<\/strong><\/p>\n<p><strong>info@frenetik.us<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and prevent threats, Frenetik, a Maryland cyber startup, is betting on something simpler: making sure attackers don\u2019t know what defenders know. The company emerged today with a fundamentally different approach using novel cyber deception [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":6041,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6040"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6040"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6040\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/6041"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}