Cybersecurity3 hrs ago

Frame Security Raises $50M to Deploy AI‑Driven Human‑Risk Defense Platform

Frame Security secures $50 million to launch an AI platform that trains employees against AI‑powered phishing and deepfake attacks.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Frame Security Raises $50M to Deploy AI‑Driven Human‑Risk Defense Platform
Source: JpostOriginal source

Frame Security closed a $50 million round and will roll out an AI‑powered platform that trains employees to resist AI‑generated phishing and deepfake attacks.

Context Israeli startup Frame Security, founded by former Unit 8200 veterans Tal Shlomo and Sharon Shmueli, announced a $50 million financing led by Index Ventures, Team8 and Picture Capital. Investors also included Wiz CEO Assaf Rappaport and tech entrepreneur Elad Gil. The capital will fund development of a new category of “human risk security” that treats employees as the primary defense line.

Key Facts - Employees make hundreds of security‑relevant decisions daily; AI now enables attackers to craft convincing social engineering messages at scale. - Frame’s platform uses generative AI to create realistic phishing simulations, deepfake audio/video, and role‑specific training modules. - The system continuously adapts, learning from user responses to refine future simulations and deliver personalized guidance. - By automating awareness training, the platform aims to close the gap that even advanced firewalls and endpoint tools cannot address.

What It Means AI‑driven attacks lower the skill barrier for threat actors, making phishing and deepfake scams more frequent and harder to spot. Traditional security stacks focus on network and endpoint protection, leaving the human element exposed. Frame’s solution shifts the focus to proactive education, turning each employee into an active sensor that can recognize and report suspicious activity.

What Defenders Should Do 1. Deploy AI‑generated phishing simulations that mirror current threat actor tactics (e.g., MITRE ATT&CK technique T1566.001 – Spearphishing Attachment). 2. Integrate simulation results with security information and event management (SIEM) tools to trigger alerts when users click malicious links. 3. Enforce multi‑factor authentication to mitigate credential theft from successful social engineering attempts. 4. Keep software patched; recent CVE‑2023‑46747 in popular email clients increased susceptibility to malicious macros. 5. Establish a rapid response workflow that includes user education after each simulated or real incident.

The infusion of $50 million positions Frame to scale its AI engine across Fortune 500 enterprises. As AI‑generated threats evolve, the next wave of security testing will likely involve real‑time deepfake detection and automated employee coaching. Watch for pilot deployments and early performance data in the coming quarters.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...