Healthcare is a critical infrastructure. Securing it requires more than compliance, it requires offensive intelligence. As part of the CYSSDE program (Cybersecurity Deployment, Preparedness, Support, Capacity & Capabilities), we are bringing advanced offensive security and continuous penetration testing to the forefront of the sector. We are taking action to directly secure: Startups, Hospitals, and Critical Infrastructure. ✅Our goal is to build a resilient digital health ecosystem where patient safety is non-negotiable, ensuring that the technologies protecting lives are protected themselves. #HealthcareSecurity #Cybersecurity #EuropeanCommission
Ethiack
Segurança de redes e computadores
Coimbra, Coimbra 7.898 seguidores
Agentic AI Pentesting
Sobre nós
Ethiack is the Ethical Hacking platform for the digital age. Our autonomous offensive security powered by hackers and AI identifies vulnerabilities instantly, allowing tech teams to focus on building.
- Site
-
https://ethiack.com
Link externo para Ethiack
- Setor
- Segurança de redes e computadores
- Tamanho da empresa
- 11-50 funcionários
- Sede
- Coimbra, Coimbra
- Tipo
- Empresa privada
- Fundada em
- 2022
- Especializações
- cybersecurity, hacking, AI, ML, security, IT, AI Pentesting e Ethical Hacking
Localidades
-
Principal
Como chegar
Instituto Pedro Nunes, R. Pedro Nunes
Coimbra, Coimbra 3030-199, PT
-
Como chegar
Rua Alfredo Allen 455
Paranhos, Porto 4200-135, PT
Funcionários da Ethiack
Atualizações
-
The biggest risk with autonomous AI agents is that a hallucination could destroy a critical asset. We solved that with our Three‑Layer Guardrail System. 🟢 Layer 1 (Prompt-level) Clear Instructions & Examples Provides the AI agent with very precise prompts and concrete examples of allowed vs. forbidden behavior, so it knows exactly what boundaries to respect from the start. 🟢 Layer 2 (Deterministic Filters) Deterministic Filters Adds hard-coded, rule-based checks that deterministically block dangerous actions, e.g. any attempt to delete databases, run rm -rf, or access sensitive environments which is automatically stopped before execution. 🟢 Layer 3 (LLM/Agenti Layer) AI-Driven Interpretation For ambiguous or complex edge cases that slip past the first two layers, a smart AI component evaluates intent/context and makes the final decision. ✅ Result: You get autonomous AI agents powerful enough to ethically hack your systems, yet safe enough that you can actually let them loose without holding your breath.
-
-
Get the latest insights on ethical hacking, AI-driven security, real-world case studies and product updates delivered straight to your inbox. Subscribe to the Ethiack’s Newsletter → No spam.Just actionable intelligence. ➡️ https://ethiack.com/news
-
-
With ongoing physical conflicts dominating the news, it is easy to forget the invisible wars happening right now. Michel Houellebecq captured the core problem of modern security in his novel Annihilation: "Offensive capabilities progress much faster than defensive measures..." The book's events take place in 2027, but Houellebecq's words describe our exact reality today. The gap between offensive capabilities and traditional defense is widening every day. We are already living in a timeline where invisible-face terrorism and cyber warfare are active threats. To secure our future, our defensive measures need to evolve just as fast as the attackers. #CyberWarfare #InfoSec #CyberSecurity
-
-
The cutting edge of AI in cybersecurity is a crazy place to be right now. We're building an AI system that hacks like a human. There are a lot of technical challenges, but each time we solve one, it unlocks a whole new world of possibilities. Our particular challenge requires much more than a single model. It requires intricate coordination. Here's how we've been doing it 👇 A pentester's workflow involves fundamentally different cognitive tasks. Reconnaissance requires breadth: map everything, miss nothing. Exploitation requires depth: understand one specific behaviour and find where it breaks. Validation requires rigour: prove the finding is real with a reproducible proof of concept. We use a multi-agent architecture. Different agents handle different phases of the testing workflow. A reconnaissance agent maps the attack surface. Specialised exploitation agents focus on specific vulnerability classes. A validation agent independently confirms findings and generates proofs of concept. The hardest technical challenge is the coordination. The agents need shared memory: what's been tested, what's been found, what's still in scope. They need to avoid duplicating work, and they need to pass context efficiently, because a finding from the recon agent ("this endpoint accepts XML input") needs to reach the right exploitation agent (the one that knows about XXE) without every agent processing every piece of information. When we nailed down this section, the true power of Hackian started to shine through. AI-powered hacking is the future!
-
We run offensive testing across hundreds of external assets simultaneously, which gives us is data on how severity scores correlate with actual exploitability. It's not good! A few patterns we see repeatedly: A dependency has a CVSS 9.8 CVE. The vulnerability requires a specific configuration that the application doesn't use. The code path that triggers it is never called, but still sits at the top of your dashboard. Meanwhile, a CVSS 5.3 information disclosure on a forgotten staging subdomain leaks internal API endpoints. Those endpoints have no authentication and they expose PII. That 5.3 is your actual critical finding, but it's buried on page four of the report. No hate towards CVSS - they have ways around this (like environment scores) but they're underutilised by most scanning tools because those tools lack context. This is why we built our risk scoring around exploitability: what's actually exposed, what's reachable from an attacker's perspective, and what chains together.
-
Ethiack was featured in the latest episode of "Linha da Frente" on RTP Play! 🇵🇹📺 The episode "A Guerra Que Não Se Vê" (The Unseen War) addressed an undeniable reality in cybersecurity. The report talks about how the latest advances in technology are introducing new vulnerabilities never seen before. Because of this, we need a coordinated, resilient, and informed response to defend against escalating cyberattacks. We are incredibly proud to share our vision and show how Ethiack is part of this solution, helping organizations stay one step ahead of these threats. 👉 Watch the full episode here (in Portuguese): https://lnkd.in/ewKxdsaW #Portugal #Lisbon #cibersegurança
-
Top pentesters are rare and costly, and they don't work 24/7. Many teams struggle to find experienced pentesters, and it's tough to even tell the difference without spending thousands of $. That creates a bunch testing gaps: infrequent engagements, limited scope, and slow follow-ups. This is where Ethiack brings autonomous Hackbots to your security stack. We can deliver continuous AI-driven pentests with enterprise-ready guardrails. 99.5% accuracy, coverage of 200+ CWE classes, and over 100k validated vulnerabilities, Ethiack finds real risks and removes the noise. Trial it today 👇
Páginas semelhantes
Visualizar vagas
Financiamento
Última rodada
SementeUS$ 4.212.522,00