Blog

Trust is the new attack vector. imper.ai starts here

Today, we’re launching imper.ai and are proud to finally share the work we have been building. For Anatoly, Rom, and me, this moment was shaped by our experience in offensive cyber. Attackers now find it easier to exploit […]

By Noam Awadish

December 4, 2025

Help desk vishing: why training isn’t the fix

Help desk vishing: why training isn’t the fix

Voice phishing is now the leading initial intrusion vector for cloud compromises and it’s routing around MFA through the help desk. Training doesn’t close the gap. Workforce identity verification does.

imper.ai

April 28, 2026

Four DPRK IT Workers Entered The Hiring Pipeline. Infrastructure-Layer Detection Stopped Them.

Four DPRK IT Workers Entered The Hiring Pipeline. Infrastructure-Layer Detection Stopped Them.

Four DPRK IT workers entered one hiring pipeline. Here’s the infrastructure-layer detection that stopped them before credentials were issued.

imper.ai

April 13, 2026

The Real-Time Impersonation Blind Spot

The Real-Time Impersonation Blind Spot

AI impersonation exploits real-time trust gaps traditional defenses miss. Workforce IDV verifies human authenticity in live interactions, blocking key threats fast.

Gil Levonai

December 18, 2025

Phishing has moved on. Have your defenses?

Phishing has moved on. Have your defenses?

For a long time, email was the center of gravity for social engineering defense. In fact, organizations built […]

imper.ai

December 4, 2025

The rise of fake help desk calls

The rise of fake help desk calls

A help desk agent answers an incoming call. On the other end, “Sara” sounds rushed, apologetic – and […]

imper.ai

December 3, 2025