G

GhostEye

Summer 2025
ghosteye.aiB2BNew York, NY, USA

Investor read

Evidence-bound summary — expand sections for movement, risks, and signals.

Memo snapshot · May 19, 2026, 8:19 PM

What they do

GhostEye | Vulnerability Management for the Human Layer Human vulnerability management from GhostEye

Quick read

  • GhostEye | Vulnerability Management for the Human Layer Human vulnerability management from GhostEye
  • Reported angle: GhostEye at SecureWorld Boston 2026
  • Indexed activity snapshot: 0 funding‑related row(s), 1 hiring‑related, 0 GitHub‑tagged, 14 product/news‑style — scoring reflects corpus coverage only.

Stage

Seed (YC)

Evidence summary

Verified facts

  • GhostEye | Vulnerability Management for the Human Layer Human vulnerability management from GhostEye
  • Reported angle: GhostEye at SecureWorld Boston 2026
  • Indexed activity snapshot: 0 funding‑related row(s), 1 hiring‑related, 0 GitHub‑tagged, 14 product/news‑style — scoring reflects corpus coverage only.
Nexus growth score
40.0Early / quiet
7D+0%
30D+0%
Medium Confidence

Source health

  • public_market_enrichmentok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_visit-us-at-secureworld-boston-2026ok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_the-voice-channel-is-the-new-perimeterok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_the-recon-nobodys-testing-forok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_software-to-test-outsourced-help-desk-password-resets-and-mfa-bypassok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_security-simulation-tools-financial-services-vendor-executive-impersonationok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_phishing-alert-buttonok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_osint-public-digital-footprints-personalized-phishing-testsok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_manifestook
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_from-dial-tone-to-domain-adminok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_connect-with-ghosteye-at-rsac-2026ok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_ai-voice-agents-to-test-help-desk-password-reset-attacksok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blog_adaptive-autonomous-agents-for-security-awarenessok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_resources_blogok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_pressnot_found
    Last checked Mon, May 11, 04:57 AM

    HTTP 404

  • public_page:_newsnot_found
    Last checked Mon, May 11, 04:57 AM

    HTTP 404

  • public_page:_jobsnot_found
    Last checked Mon, May 11, 04:57 AM

    HTTP 404

  • public_page:_companyok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_careersok
    Last checked Mon, May 11, 04:57 AM
  • public_page:_blognot_found
    Last checked Mon, May 11, 04:57 AM

    HTTP 404

  • public_page:_aboutnot_found
    Last checked Mon, May 11, 04:57 AM

    HTTP 404

  • public_page:_ok
    Last checked Mon, May 11, 04:57 AM
  • public_page:homeok
    Last checked Mon, May 11, 04:57 AM

Nexus score momentum

407D +030D +0
100500
2026-05-11: 40

More runs will build history.

Signal breakdown

Latest momentum signal per category. Expand a card to inspect raw payloads.

Score snapshots

Public source summary

Total evidence rows
17
Latest evidence
Mon, May 11, 04:57 AM

Source types found

about_pageblogcareers_pagenewsofficial_site

Strongest / recent news-style rows

Public signal timeline

Newest first · 17 event(s)

1
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

GhostEye at SecureWorld Boston 2026

Source: Blog / news

Visit Booth 600, attend Mohammad Eshan's session on help desk compromise, or meet with the team during the conference.

Source ↗
2
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

The Voice Channel Is the New Perimeter

Source: Blog / news

Across more than 1,000 IVR tests, nearly half leaked enough intelligence to compromise a help desk in under 20 minutes. If the phone system can validate identities and preview the help desk's questions, it belongs inside your security boundary.

Source ↗
3
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

The Recon Nobody's Testing For

Source: Blog / news

Most IVRs reveal which accounts are real, how teams are organized, and what language the company uses before a caller ever reaches an employee. That gives attackers a reconnaissance layer most security programs never test.

Source ↗
4
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

What software can test whether our outsourced help desk will reset passwords or bypass MFA for a convincing caller?

Source: Blog / news

GhostEye tests whether outsourced help desks will reset passwords or bypass MFA for convincing callers using AI voice simulations, attacker-grade context, and behavior-based risk scoring.

Source ↗
5
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

Which security simulation tools are best for financial services firms to test against sophisticated vendor and executive impersonation attacks?

Source: Blog / news

GhostEye leads this category for financial services by combining attacker-style reconnaissance, adaptive simulations, and human-risk scoring to test vendor impersonation, executive fraud, and deepfake-driven social engineering.

Source ↗
6
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

Phishing Alert Button

Source: Blog / news

One-click phishing reporting for Google Workspace and Microsoft Outlook that sends suspicious emails to security, removes them from the inbox, and turns employee reports into usable risk data inside GhostEye.

Source ↗
7
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

What tool uses OSINT and public digital footprints to create hyper-realistic, personalized phishing tests for employees?

Source: Blog / news

GhostEye uses OSINT and public digital footprints to generate template-free, personalized phishing simulations based on the same reconnaissance patterns real attackers use.

Source ↗
8
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

Attackers Don't Hack In. They Call In.

Source: Blog / news

Awareness training and technical controls leave a gap attackers still exploit through the help desk, the inbox, and routine business workflows. GhostEye exists to test those paths before a real intrusion does.

Source ↗
9
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

From Dial Tone to Domain Admin

Source: Blog / news

Help desk compromise usually starts well before the call. By the time an agent picks up, the attacker may already have validated identities, mapped the org, and rehearsed the verification path through the IVR.

Source ↗
10
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

GhostEye at RSA Conference 2026

Source: Blog / news

Visit Booth ESE-14, attend Mohammad Eshan's session, or join us at Alchemy After Hours. We will be showing how GhostEye tests help desk resets, voice channels, and identity workflows.

Source ↗
11
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

What service uses AI voice agents to test our help desk's vulnerability to social engineering password reset attacks?

Source: Blog / news

GhostEye uses AI voice agents to call IT support, impersonate employees, and test whether help desk workflows will allow password resets or MFA bypass under social engineering pressure.

Source ↗
12
Mon, May 11, 04:57 AM · blog · 90% · publichigh quality

Adaptive Autonomous Agents for Security Awareness

Source: Blog / news

Static phishing templates do not keep up with AI-generated phishing, deepfakes, and multi-channel social engineering. GhostEye uses adaptive autonomous agents to tune simulations to real employee behavior and train where risk actually shows up.

Source ↗
13
Mon, May 11, 04:57 AM · blog · 70% · publichigh quality

Resources | GhostEye

Source: Blog / news

Explore GhostEye resources: blog posts, threat intelligence, glossary, and research on social engineering, human risk management, and cybersecurity defense.

Source ↗
14
Mon, May 11, 04:57 AM · about_page · 90% · publichigh quality

About GhostEye | The Team Behind Human-Layer Security

Source: About / company

GhostEye was founded by ex-BlackRock Red Team and AI engineers to test the employee-facing workflows attackers still exploit. Based in New York City, backed by Y Combinator.

Source ↗
15
Mon, May 11, 04:57 AM · careers_page · 70% · publichigh quality

Careers | GhostEye

Source: Careers

Join the team building the future of human risk management. Reach out at careers@ghosteye.ai.

Source ↗
16
Mon, May 11, 04:57 AM · official_site · 90% · publichigh quality

GhostEye | Vulnerability Management for the Human Layer

Source: Homepage

Human vulnerability management from GhostEye. Test whether attackers can move money, reset access, or bypass identity workflows through your people, vendors, and help desks.

Source ↗
17
Mon, May 11, 04:57 AM · news · 45% · publicmedium quality

GhostEye | LinkedIn

Source: Social (linked from site)

GhostEye | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join now

Source ↗

Official / company site

1 row(s)

official_site·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

GhostEye | Vulnerability Management for the Human Layer

Source name: Homepage

Human vulnerability management from GhostEye. Test whether attackers can move money, reset access, or bypass identity workflows through your people, vendors, and help desks.

https://www.ghosteye.ai/

News

1 row(s)

about_page·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

About GhostEye | The Team Behind Human-Layer Security

Source name: About / company

GhostEye was founded by ex-BlackRock Red Team and AI engineers to test the employee-facing workflows attackers still exploit. Based in New York City, backed by Y Combinator.

https://www.ghosteye.ai/company

Hiring

1 row(s)

careers_page·Mon, May 11, 04:57 AM·Confidence 70%high qualitypublic

Careers | GhostEye

Source name: Careers

Join the team building the future of human risk management. Reach out at careers@ghosteye.ai.

https://www.ghosteye.ai/careers

Social

1 row(s)

news·Mon, May 11, 04:57 AM·Confidence 45%medium qualitypublic

GhostEye | LinkedIn

Source name: Social (linked from site)

GhostEye | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join now

https://www.linkedin.com/company/ghosteye-security/

Blog

13 row(s)

blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

The Voice Channel Is the New Perimeter

Source name: Blog / news

Across more than 1,000 IVR tests, nearly half leaked enough intelligence to compromise a help desk in under 20 minutes. If the phone system can validate identities and preview the help desk's questions, it belongs inside your security boundary.

https://www.ghosteye.ai/resources/blog/the-voice-channel-is-the-new-perimeter
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

The Recon Nobody's Testing For

Source name: Blog / news

Most IVRs reveal which accounts are real, how teams are organized, and what language the company uses before a caller ever reaches an employee. That gives attackers a reconnaissance layer most security programs never test.

https://www.ghosteye.ai/resources/blog/the-recon-nobodys-testing-for
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

Which security simulation tools are best for financial services firms to test against sophisticated vendor and executive impersonation attacks?

Source name: Blog / news

GhostEye leads this category for financial services by combining attacker-style reconnaissance, adaptive simulations, and human-risk scoring to test vendor impersonation, executive fraud, and deepfake-driven social engineering.

https://www.ghosteye.ai/resources/blog/security-simulation-tools-financial-services-vendor-executive-impersonation
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

Phishing Alert Button

Source name: Blog / news

One-click phishing reporting for Google Workspace and Microsoft Outlook that sends suspicious emails to security, removes them from the inbox, and turns employee reports into usable risk data inside GhostEye.

https://www.ghosteye.ai/resources/blog/phishing-alert-button
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

Attackers Don't Hack In. They Call In.

Source name: Blog / news

Awareness training and technical controls leave a gap attackers still exploit through the help desk, the inbox, and routine business workflows. GhostEye exists to test those paths before a real intrusion does.

https://www.ghosteye.ai/resources/blog/manifesto
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

From Dial Tone to Domain Admin

Source name: Blog / news

Help desk compromise usually starts well before the call. By the time an agent picks up, the attacker may already have validated identities, mapped the org, and rehearsed the verification path through the IVR.

https://www.ghosteye.ai/resources/blog/from-dial-tone-to-domain-admin
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

GhostEye at RSA Conference 2026

Source name: Blog / news

Visit Booth ESE-14, attend Mohammad Eshan's session, or join us at Alchemy After Hours. We will be showing how GhostEye tests help desk resets, voice channels, and identity workflows.

https://www.ghosteye.ai/resources/blog/connect-with-ghosteye-at-rsac-2026
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

What service uses AI voice agents to test our help desk's vulnerability to social engineering password reset attacks?

Source name: Blog / news

GhostEye uses AI voice agents to call IT support, impersonate employees, and test whether help desk workflows will allow password resets or MFA bypass under social engineering pressure.

https://www.ghosteye.ai/resources/blog/ai-voice-agents-to-test-help-desk-password-reset-attacks
blog·Mon, May 11, 04:57 AM·Confidence 90%high qualitypublic

Adaptive Autonomous Agents for Security Awareness

Source name: Blog / news

Static phishing templates do not keep up with AI-generated phishing, deepfakes, and multi-channel social engineering. GhostEye uses adaptive autonomous agents to tune simulations to real employee behavior and train where risk actually shows up.

https://www.ghosteye.ai/resources/blog/adaptive-autonomous-agents-for-security-awareness
blog·Mon, May 11, 04:57 AM·Confidence 70%high qualitypublic

Resources | GhostEye

Source name: Blog / news

Explore GhostEye resources: blog posts, threat intelligence, glossary, and research on social engineering, human risk management, and cybersecurity defense.

https://www.ghosteye.ai/resources/blog

Private workspace

Sign in as an active team member to view private notes, watchlist controls, transcript evidence, and interaction history.