SCYTHE, a leading provider of Adversarial Exposure Validation (AEV) and continuous security control testing, has announced a strategic partnership with Starseer, an innovator in AI Runtime Assurance and Detection Engineering. Together, the two companies aim to help organizations proactively defend against the rapidly growing threat of AI-driven and autonomous cyber attacks.
As artificial intelligence becomes more deeply embedded across enterprise environments, it is also rapidly emerging as a new and highly attractive attack surface. Through this partnership, SCYTHE and Starseer are combining adversary emulation, AI visibility, and runtime assurance to deliver what they describe as the industry’s first commercial offering purpose-built to prepare businesses for AI-enabled and agentic adversaries.
“AI is becoming an attack surface faster than most security programs can adapt,” said Tim Schulz, CEO and co-founder of Starseer. “By combining SCYTHE’s ability to safely emulate real adversary behavior with Starseer’s depth of visibility to control the very decision-making process that AI makes, we’re giving defenders a safe and reliable way to test their security posture against AI-enabled threats.”
Cyber Technology Insights: SixMap Launches New Capabilities to Strengthen Cyber Defense Against AI-Driven Attacks
Defending Against AI-Native Attack Paths
As a first step, the companies are launching a joint solution focused on Shadow AI Readiness Assessments. This offering targets a critical and often overlooked risk: unauthorized AI models and inference tools already operating across enterprise environments. These hidden systems can be quietly exploited by attackers, allowing them to establish agentic footholds without deploying traditional malware or new tooling.
Through the joint solution, organizations can now validate their preparedness across three core areas. First, they can detect unauthorized, manipulated, or malicious AI models operating inside the enterprise. Second, they can test response capabilities when attackers attempt to misuse internal AI infrastructure for autonomous operations. Third, they can conduct forensic analysis to trace model origins, tampering activity, and adversarial abuse.
Importantly, this initiative builds on emerging real-world threat activity, including recent AI-driven intrusion campaigns such as the “LameHug” malware family, which demonstrated how large language models can be weaponized to support cyber operations.
“Enterprises already know how to test endpoints, networks, and cloud controls, but very few know how to test AI as an attack surface,” said Bryson Bort, CEO and founder of SCYTHE. “This partnership lets security teams safely emulate AI-native attack paths, validate whether controls actually work, and produce defensible evidence that they can detect adversarial AI models and agents in their enterprise.”
Cyber Technology Insights: Fortinet Report Reveals Record Surge in AI-Driven Automated Cyberattacks and New Tactics
Extending Continuous Threat Exposure Management into AI
Beyond point-in-time assessments, the partnership significantly expands Continuous Threat Exposure Management (CTEM) into the AI domain. By integrating SCYTHE’s adversary emulation and exposure validation with Starseer’s AI inspection and assurance capabilities, organizations can now embed AI security directly into red, blue, and purple team workflows.
As a result, enterprises gain the ability to assure AI models, agents, and runtimes across their environments, validate AI behavior and provenance within security operations, and extend CTEM programs to include AI-driven attack paths and autonomous workflows.
Ultimately, the SCYTHE–Starseer alliance enables organizations to move from unmanaged AI blind spots to an AI-validated security posture. As enterprises rapidly adopt autonomous agents, edge AI, and internal model ecosystems, this capability becomes essential for maintaining visibility, trust, and control in the next generation of cyber defense.
Cyber Technology Insights: Zscaler ThreatLabz Uncovers Surge in AI-Driven Cyberattacks Targeting Business Operations
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com





