κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV
άμυνα
.

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

06/06/2025

Jun 06, 2025The Hacker NewsCyber Resilience / Penetration Testing
Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset.
This is where AEV comes in.
AEV (Adversarial Exposure Validation) is an advanced offense technology that mimics how adversaries will attack your system, while providing remediation strategies. It lets you discover and address how your environment can be exploited and what the impact of the exploitation could be, in a dynamic and ongoing way.
In this article, we’ll share everything you need to know about AEV, and how your team can leverage it to build continuous resilience against attacks.
What is AEV?
According to the Gartner® Market Guide for Adversarial Exposure Validation (March 2025), AEV is defined as “technologies that deliver consistent, continuous, and automated evidence of the feasibility of an attack.” AEV operates by emulating cyber-attacks, providing organizations with an understanding of how attackers can infiltrate their networks. This allows organizations to take relevant security measures to effectively remediate security gaps.
AEV technologies effectively consolidate previously isolated security testing methods, like Automated Penetration Testing and BAS (Breach and Attack Simulation). Gartner says “As the two markets developed and overlapping capabilities increased, the two functions converged to unite offensive technologies”.
AEV’s focus is on replicating an actual adversary’s mindset. By combining the breadth of automated pentesting and the impact-driven focus of BAS, AEV enables continuous testing that mirrors how real attackers adapt over time. Organizations can continuously emulate how attackers operate, providing a more insightful confirmation of vulnerabilities and how to best fix them.
How AEV Supports Exposure Management
AEV emerged as a technological solution to support CTEM (Continuous Threat Exposure Management) practices. CTEM is an all-encompassing program that helps organizations identify vulnerabilities and exposures, determine the risk profiles of digital assets, prioritize their risk mitigation, and then monitor remediation.
Here’s how AEV facilitates CTEM:

  • Filtering Mechanism – Instead of generating massive lists of generic findings, AEV narrows down the vulnerabilities found to be actually exploitable. A process that confirms the legitimacy of security issues and assesses how easily they can be accessed by threat actors. This approach is far more efficient than traditional patch-everything methods as it only flags the highest-risk issues, and in the process identifies exposures that are benign and don’t actually warrant remediation.
  • Continuous Nature – Rather than a one-time event or a brief engagement, AEV’s ongoing and frequent automated tests support CTEM’s continuous feedback loop of discovery, testing, and remediation. This helps to ensure a perpetual state of attack readiness even in the face of new threat techniques and as the IT environment changes and new software misconfigurations develop.
  • Real Testing – Staging environments often fail to accurately represent the actual conditions in which attackers would exploit an environment. These include misconfigurations, dormant user accounts, data anomalies, and complex integrations. Some best-of-breed AEV tools address this by testing safely in production environments, making them far more accurate and effective at identifying vulnerabilities that could lead to a disastrous impact.
  • Remediation Beyond Patching – Beyond just patching exploitable CVEs, AEV identifies non-patchable vulnerabilities for remediation, like replacing exposed credentials, implementing the principle of least privilege, fixing misconfigurations, replacing insecure third-party software, and more. This is aligned with CTEM’s remediation guidance, which holistically seeks to reduce exposure to potential threats and risks.

AEV for Red Teams
AEV automatically identifies how an attacker might chain together multiple vulnerabilities across different environments. This makes it a staple in any red teamer’s toolkit.
With AEV, red teams can more easily model attack scenarios. This includes complex ones like attackers hopping between cloud infrastructure and on-prem systems or pivoting through different network segments, while overcoming existing controls and combining low-scoring exposures into a full-scale breach.
Equipped with information provided by AEV, red teams gain a clear view of how a determined attacker might move laterally, allowing them to scale their efforts and fast-track mitigation. For the organization, AEV ensures cost-effective red-teaming and even allows for entry-level red-teamers to provide quality results. GenAI is expected to augment this even further by providing ideas and explanations for complex attack scenarios.
AEV for Blue Teams
For blue teamers, AEV provides a strong head start. With AEV, defenders can see in the face of an attack which protections are really robust, which require strengthening, and which controls are in fact redundant. This helps defenders ensure that their security posture is working at its best using a trending analysis to show that the program works as expected.
Blue teams can use insights and data from AEVs for:

  • Detection stack tuning
  • Preventive posture changes
  • Exposure prioritization
  • Service provider performance validation
  • Security vendor performance scorecards
  • Other operations or controls improvements

AEV for Security Resilience
AEV is designed to provide continuous, automated, and realistic simulations of how attackers could exploit weaknesses in an organization’s defenses. No wonder it is quickly emerging as a pivotal technology in cybersecurity. With AEV, security teams are getting that proven validation of how exposures in their environment could be exploited and to what end, enabling smarter prioritization and effective remediation at a faster pace. This necessary clarity is key to fostering cyber resilience.
To learn more about how to implement AEV, and its role within a wider CTEM practice, register to attend Xposure, Pentera’s Exposure Management Summit.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source: thehackernews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-2

Our favorite third-party Windows customization tool now lets you clean your storage better

If you want to take control over Windows' features, you could do a lot worse than giving Wintoys a try. It's a cool little third-party suite of stuff you can check out, and we recently named it something everyone should be using. Source: xda-developers.com … [Read More...]

One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates

Windows 10's end-of-life date is fast approaching, and in response, the apps designed to help people transition to Windows 11 are undergoing a flurry of updates to handle the expected influx of users better. Currently, two apps help users bypass Windows 11's system requirements: Rufus (which recently received a dark mode update) and Flyoobe (formerly Flyby11). Source: xda-developers.com … [Read More...]

Heidi Health raises $65M Series B led by Steve Cohen’s Point72

Dr. Tom Kelly is a trauma surgeon, and everywhere, he sees doctors drowning in administrative work. He wanted change, so he set out to build it.  “We wanted to build an AI care partner that would stand alongside clinicians and take care of the admin so that individual providers, like me, can feel empowered to deliver the care which we dedicated our lives to,” he told … [Read More...]

OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone

OnePlus 15 launch appears to be around the corner, after the company confirmed that the smartphone will make its debut in China in October. Meanwhile, a new report claims that the OnePlus 13 successor will be backed by the largest battery ever seen on a OnePlus smartphone. Alongside, it is also expected to support wireless charging. The new details arrive just days after a tipster claimed that the … [Read More...]

3 reasons why Perplexity’s Comet has become my go-to browser

There’s no shortage of browsers nowadays, and a new one seems to pop up every few days. And though some of the browsers that launch quietly fade away and are eventually forgotten, every so often one comes along that manages to take over the internet. Source: xda-developers.com … [Read More...]

3 signs that you need a new CPU instead of a GPU

When you experience lower average frame rates or FPS drops, it's easy to assume that your graphics card is the culprit. After all, it's the main component that drives the visuals while you're gaming. However, the issue is that your GPU isn't always the primary cause of all your FPS issues. Although it does most of the heavy lifting in graphically demanding workloads, your CPU plays an equally … [Read More...]

The 3 PlayStation Plus games announced at State of Play you have to download to your PS5

PlayStation has been building up the catalog of classics and new titles available to players through the PlayStation Plus game catalog. With the September 2025 State of Play presentation, that catalog of titles for PS5 owners is continuing to get larger, offering a variety of games to play on the console. Unlike previous showings of State of Play, some highly requested and classic games are making … [Read More...]

5 productivity apps that made my NAS more useful than Google Workspace

Google Workspace is the industry default productivity suite, and rightly so — it’s fast, reliable, has excellent integrations, and offers handy collaboration features. However, it is just another subscription added to your credit card, which starts to bother you, especially if your team size is growing. Source: xda-developers.com … [Read More...]

6 tiny self-hosting tools that save me hours every week

If you are like me, you love the idea of self-hosting, but hate the thought of endless configuration and maintenance. The truth is, self-hosting doesn’t have to be a major time sink – it can actually be a massive time saver. I have spent months testing and refining my setup, and in the process, I have found tiny set-it-and-forget-it tools that work tirelessly in the background. Source: … [Read More...]

4 video game franchises that have lost their identity

Every successful game franchise has something that makes it unique: a style, a story, or a gameplay mechanic that players fall in love with. But when a series strays too far from its roots, that identity starts to fade. Here are four big franchises that lost touch with what made them special. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • Our favorite third-party Windows customization tool now lets you clean your storage better
  • One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates
  • Heidi Health raises $65M Series B led by Steve Cohen’s Point72
  • OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone
  • 3 reasons why Perplexity’s Comet has become my go-to browser

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023