Frame Security Debuts with $50M in Funding to Fight AI-Driven Social Engineering

Frame Security Launches with $50M to Combat AI-Powered Phishing and Deepfakes

INFORMATIONAL
May 13, 2026
4m read
PhishingOtherThreat Intelligence

Related Entities

Organizations

Unit 8200

Other

Frame SecurityIndex VenturesTeam8Picture CapitalWiz Assaf RappaportTal ShlomoSharon ShmueliGartner

MITRE ATT&CK Techniques

Full Report

Executive Summary

Frame Security, a cybersecurity startup founded by veterans of Israel's elite Unit 8200 and the cloud security giant Wiz, has emerged from stealth with a substantial $50 million in funding. The company, which officially launched on May 12, 2026, is focused on what it calls "human risk security." It aims to defend organizations against the next generation of social engineering attacks that are increasingly powered by artificial intelligence, including convincing deepfakes, voice cloning, and highly personalized phishing campaigns. Frame's platform moves beyond traditional security awareness training by using AI to create continuous, automated, and hyper-realistic attack simulations tailored to individual employees.

Threat Overview

Frame Security is addressing a rapidly escalating threat: the weaponization of generative AI for social engineering. As AI models become more sophisticated, threat actors are using them to:

  • Scale Phishing: Generate massive volumes of grammatically perfect and contextually aware phishing emails.
  • Create Deepfakes: Produce realistic video and audio (voice cloning) of executives or colleagues to trick employees into making fraudulent wire transfers or giving up credentials.
  • Automate Impersonation: Use AI chatbots to engage victims in real-time conversations across platforms like SMS, Slack, or Teams, building trust before making a malicious request.

Traditional security awareness training, which typically involves annual or quarterly videos and simulated phishing tests, is proving insufficient against these dynamic, personalized, and highly believable attacks. Frame argues that the "human layer" is the new front line and requires a new approach to defense.

Technical Findings

Frame Security's platform is designed to provide a continuous feedback loop for employee training and awareness. Its core features include:

  • AI-Powered Simulations: The platform can automatically generate and deliver hyper-realistic attack simulations across various channels, including email, chat (Slack/Teams), voice, and video. This goes beyond simple email phishing tests.
  • Behavioral Analysis: It continuously analyzes organizational communication patterns and employee behavior to understand the specific threats different roles and individuals are likely to face.
  • Personalized Training: Based on the analysis, it delivers personalized, on-the-spot guidance and micro-trainings. For example, if an employee receives an unusual financial request, the system might intervene with a real-time warning or a short training module.

Impact Assessment

The rise of AI-powered social engineering represents a significant threat to all organizations. A successful attack can lead to:

  • Financial Loss: Fraudulent wire transfers based on deepfake executive impersonation can cost millions.
  • Data Breaches: Employees tricked into revealing credentials can give attackers the keys to the kingdom.
  • Loss of Trust: The inability to trust digital communications can slow down business operations and erode morale.

By providing a more dynamic and continuous training model, Frame Security aims to reduce the likelihood of employees falling victim to these attacks, thereby mitigating the associated risks.

Lessons Learned

The emergence of companies like Frame Security highlights a critical shift in the cybersecurity landscape:

  • The Human Element is Key: For years, the industry has focused on technical controls. While essential, they are not enough. Fortifying the human element is now a top priority.
  • Training Must Evolve: Static, one-size-fits-all training is obsolete. The future of security awareness is continuous, personalized, and integrated into the employee's daily workflow.
  • Defense Must Use AI: To fight AI-powered attacks, organizations need AI-powered defenses. Manually created training content cannot keep pace with the speed and adaptability of malicious AI.

Mitigation Recommendations

While Frame Security offers a commercial solution, the principles behind its approach can be adopted by any organization:

  • Augment Training with Real-World Scenarios: Move beyond generic phishing tests. Use recent, real-world examples of attacks in your training to make it more relevant.
  • Establish Verification Procedures: Implement strict, out-of-band verification procedures for any sensitive requests, especially those involving financial transactions or data access. For example, a verbal confirmation over a known phone number for any wire transfer request received via email. This is a form of Out-of-Band Authentication (D3-OOBA).
  • Leverage Technical Controls: Use advanced email security solutions that can detect signs of impersonation and analyze link/attachment payloads. D3FEND's URL Analysis (D3-UA) and File Analysis (D3-FA) are relevant here.

Timeline of Events

1
May 12, 2026
Frame Security publicly launches and announces its $50 million funding round.
2
May 13, 2026
This article was published

MITRE ATT&CK Mitigations

The core focus of Frame Security's platform is to provide a new, more effective model for user training against social engineering.

Timeline of Events

1
May 12, 2026

Frame Security publicly launches and announces its $50 million funding round.

Sources & References

Israeli startup Frame Security raises $50m
The Jerusalem Post (jpost.com) May 12, 2026
Frame Security launches with $50m to fight AI threats
RegTech Analyst (regtechanalyst.com) May 12, 2026
Frame Security Debuts With $50M for Human-Centric Protection
BankInfoSecurity (bankinfosecurity.com) May 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

startupventure capitalsecurity awarenesshuman firewallsocial engineeringdeepfakevoice cloning

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.