Brazilian companies suffered, on average, more than 2,600 cyberattacks per week in early 2025, a 21% increase over the previous year, according to a survey by Check Point Research. In this scenario, the traditional "firefighting" approach to digital security proves insufficient given the speed and sophistication of threats, many of which are powered by artificial intelligence.
"The future of digital defense requires us to stop waiting for attacks to happen. The answer lies in offensive protection: thinking and acting like an attacker to find and fix flaws before they are exploited," says Rodolfo Almeida, COO of ViperX, an offensive protection startup from the Dfense Group.
From Reaction to Anticipation: The Attacker's Mentality
Offensive protection consists of simulating the actions of a real attacker to identify vulnerabilities and block them before they are exploited. Techniques such as red teaming and adversary emulation allow for the validation of technical and logical flaws, prioritizing fixes based on the actual risk.
The philosophy of the "good hacker," a professional hired to act ethically and in a controlled manner, is already adopted in countries like the US and members of the European Union, as well as Brazilian initiatives like the Central Bank and the Cyber Guardian exercise. "This approach goes beyond a simple annual checklist: it incorporates security as a strategic function of the organization," explains the executive.
The recently sanctioned National Cybersecurity Strategy (E-Ciber) reinforces this need, elevating the issue to the State sphere, with pillars of resilience and cooperation.
Artificial Intelligence: Accelerating Offensive Protection
AI shouldn't be seen as an enemy, but rather as an ally in the anticipation process. It connects disparate information, from cloud changes to leaked credentials, to pinpoint where an attack would likely begin.
For Almeida, technology enhances offensive security on three fronts:
- Mapping and prioritization – continuous scanning of the attack surface and highlighting the most critical gaps;
- Attack tests – simulation of realistic scenarios to test controls and quickly identify failures;
- Accelerated remediation – suggesting and automating solutions to reduce rework and eliminate opportunities for criminals.
“With AI, we find open doors and can close them before they are crossed,” highlights the executive.
From punctual action to continuous discipline
Almeida emphasizes that technology alone won't solve the problem. It's necessary to abandon the "one-off project" model and adopt a continuous threat exposure management ( CTEM ) approach.
The executive recommends that companies prioritize metrics that reflect real business impact, such as remediation time and number of attack paths blocked, and adopt ongoing testing and training programs, in addition to sharing knowledge with partners and ecosystem organizations.
“Digital security is not just about protecting yourself, but about building a more resilient digital future for everyone,” concludes Almeida.