A Project · Seeking Design Partners

See Your Attack Surface.
Before They Do.

StarSec builds a digital twin of your infrastructure and uses AI-powered attack tree evaluation to surface and prioritize the vulnerabilities that genuinely put your system at risk.

25,000+
New CVEs published in 2024
5%
Of vulnerabilities are ever actively exploited
60%
Of security team effort spent on low-risk issues
The Problem

Information overload is breaking enterprise security

"Security teams are overwhelmed. Every day brings thousands of new advisories — yet the tools they rely on treat a critical RCE in a public-facing service the same as an obscure library flaw buried three hops away. Context is everything. Without it, the wrong vulnerabilities get patched first."

Our solution captures a unified representations of enterprise informations (technical and business assets), so that their context is also stored. This allows us to conduct context-aware analysis of the system and its vulnerabilities.

Missing Business Context

Without understanding the business impact and criticality of each vulnerability, security teams struggle to prioritize their efforts effectively.

Missing Technical Context

CVSS scores ignore your real topology. A "Medium" finding on a perimeter gateway may be far more dangerous than a "Critical" in an isolated sandbox.

Slow Response

Manual triage and fragmented toolchains extend mean time to remediate critical vulnerabilities to weeks or months.

Wasted Resources

Engineers burn cycles patching vulnerabilities that pose no realistic threat while high-risk exposures wait in the queue.

The Solution

Intelligent vulnerability management, end to end

StarSec create an internal representation of a system, which captures both technical and business context.

Digital Twin Engine

We automatically build and continuously maintain an accurate, internal model of your entire IT infrastructure — capturing services, dependencies, data flows, and trust boundaries in real time.

Core Technology

Attack Tree Evaluation

StarSec automatically generates and evaluates attack trees rooted in your specific topology. Every possible path from an external attacker to your critical assets is modeled, scored, and ranked by exploitability.

AI-Powered

Contextual Prioritization

Vulnerabilities are scored not just by severity, but by real-world exploitability within your environment. We can help you identify the most critical assets in your system that require your attention, regardless of the underlying technology.

Risk-Based

Continuous Monitoring

As your infrastructure evolves, StarSec updates your risk picture automatically. Get notified the moment a new vulnerability materially changes your attack surface — before attackers find out.

Real-Time
How It Works

From infrastructure to insight in three steps

01

Connect & Map

StarSec integrates with your existing IT infrastructure, and automatically constructs a live digital twin, capturing every node, dependency, and data flow.

02

Model & Evaluate

Our engine generates comprehensive attack trees on the digital twin, simulating adversarial paths and evaluates the probability and impact of each route.

03

Prioritize & Validate

Your team receives security reports containing the testing outputs of the attack scenarios determined by the attack tree engine. We find week spots, validate findings, and provide remediation guidance.

STARSEC
Our Story

Born from Leading Hungarian Academic Research

The project was started as a part of a consortium research project called "DOSS", which was funded by the European Commission and focused on developing a reference model for the market to operate securely across the whole supply chain.

Our part was to develop a so called "digital cybersecurity twin" framework that automates the testing of larger, complex IT infrastructures. We have built a working prototype of the core engine, and validated the attack tree evaluation approach in a lab environment with real-world topologies and vulnerabilities.

Currently we are working towards creating a industry proof-of-concept, and are looking for design partners to collaborate with on this next phase of development.

2023
Idea formed. Research phase begins.
2025
First proof-of-concept built for lab environemnt.
2026
Won funding for industry proof-of-concept.
2026
Industry proof-of-concept development.
The Team

University Researchers and Emerging Security Professionals

Fogti István

István Fogti

Integration

PS

Péter Szabó

CTO & Co-founder

EH

Eszter Horváth

Head of Research

BN

Balázs Nagy

Lead Engineer

Early Access

Want to shape the product together?

We're looking for pilot partners — security teams willing to work closely with us, give feedback, and help define what great vulnerability management looks like. Reach out and let's talk.

Get in Touch