Frenetik, a Maryland-based cybersecurity startup, just emerged from stealth with a new approach. Instead of flooding defenders with more data, it starves attackers of the information they need to move. The technology transforms existing deception tools from passive traps into active ones.Frenetik, a Maryland-based cybersecurity startup, just emerged from stealth with a new approach. Instead of flooding defenders with more data, it starves attackers of the information they need to move. The technology transforms existing deception tools from passive traps into active ones.

Cyber Startup Frenetik Launches With Patented Deception Technology Betting Against The AI Arms Race

2025/12/03 03:12
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Bethesda, USA / Maryland, December 2nd, 2025/CyberNewsWire/--While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and prevent threats, Frenetik, a Maryland cyber startup, is betting on something simpler: making sure attackers don't know what defenders know.

The company emerged today with a fundamentally different approach using novel cyber deception and a newly issued U.S. patent to back it.

Traditional deception tools deploy fake systems, wait for attackers to find them, and hope they interact. Frenetik's patented "Deception In-Use" technology (U.S. Patent 12,463,981 - "Systems and Methods for Counter-Reconnaissance in Cloud Infrastructure to Disrupt Adversarial Targeting") takes a different path: it continuously rotates actually used identities and resources across Microsoft Entra (M365), AWS, Google Cloud, and on-premises environments. The critical details of who changed, what changed, when, where, and how travel through out-of-band channels accessible only to trusted parties.

Defenders stay informed. Attackers work from stale intelligence. "Adversaries, especially AI-driven ones, build models based on reconnaissance. They assume the environment they mapped earlier is the environment they'll exploit today," Ismirnioglou explained. "We break that assumption without needing a bigger GPU cluster by simply depriving them of easily discoverable information."

Users can think of it as musical chairs for hackers: by the time they figure out where to sit, everything has moved—and only defenders know which chairs are real and which have become traps.

The technology transforms existing deception tools from passive traps into active ones. When Frenetik rotates real resources, attackers following stale intelligence get funneled straight into honeypots and decoys, supercharging interaction rates with classic deception elements that previously only hoped to look real. Unlike solutions requiring extensive tuning or analyst oversight, Frenetik works because attackers simply lack the information needed to know the difference.

"I want the adversary to have to continuously put a dedicated body onto every target they go after - no more free lunches or easy days for America's adversaries," says Ismirnioglou.

https://www.youtube.com/embed/JaUQ8MRXLSw

About Frenetik

Frenetik, a Maryland-based cybersecurity startup, just emerged from stealth with a new approach: instead of flooding defenders with more data, it starves attackers of the information they need to move.

Focused on measurable security outcomes, and pricing transparency, Frenetik is built to tip the balance of power by denying adversaries trustworthy insight into targeted environments. Frenetik offers a free community version at www.frenetik.us.

Contact

Founder

Hans Ismirnioglou

Frenetik

info@frenetik.us

:::tip This story was published as a press release by Cybernewswire under HackerNoon’s Business Blogging Program. Do Your Own Research before making any financial decision.

:::

\

Market Opportunity
CyberConnect Logo
CyberConnect Price(CYBER)
$0.5312
$0.5312$0.5312
+0.52%
USD
CyberConnect (CYBER) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.