#328 Kevin Tian: Exploring Doppel's AI-Native Social Engineering Defense Platform
Episode
48 min
Read time
2 min
Topics
Artificial Intelligence, Software Development
AI-Generated Summary
Key Takeaways
- ✓Attack Kill Chain Framework: Social engineering attacks follow a predictable sequence—preparation, engagement, and asset seizure (money or data). Defenders should map security tools against each stage rather than treating attacks as isolated incidents. Doppel structures its entire platform around disrupting all three phases simultaneously across domains, social media, phone, and ad networks.
- ✓Phone Call Vectors Dominate Enterprise Breaches: Groups like Scattered Spider and Shiny Hunters compromise casinos, banks, airlines, and tech companies primarily through phone calls to customer support, IT helpdesks, and HR lines—not email. Security training programs that focus only on phishing emails miss the highest-impact attack vector currently being exploited against large organizations.
- ✓AI Agent Simulations Run Six-Minute Conversations Undetected: Doppel's offensive AI agent, which it calls Vibe Phishing, conducts deepfake voice calls where targets engage for an average of six minutes without detecting the deception. Organizations should test helpdesk and customer support staff specifically with multichannel simulations—not just phishing emails—because those roles are the primary targets.
- ✓Out-of-Band Verification Reduces Deepfake Risk Without Technology: When verifying someone's identity on a video call, ask them to show their phone's selfie camera view, pose questions about hyper-local topics, or reference fictional places to test for pre-scripted AI responses. Cross-referencing through a second known communication channel—a verified phone number or LinkedIn message—makes simultaneous multi-platform impersonation significantly harder to execute.
- ✓Ground Truth Data Scales Defensively: Doppel's business model—charging enterprises directly rather than monetizing ads—gives it verified ground truth on what legitimate brand activity looks like for each client. This data advantage compounds as more customers onboard, enabling more accurate threat detection. Enterprises should prioritize security vendors whose detection models train on verified organizational data rather than generic threat feeds.
What It Covers
Kevin Tian, cofounder and CEO of Doppel, explains how AI-native social engineering attacks—spanning deepfake phone calls, fake LinkedIn personas, SEO poisoning, and brand impersonation—are scaling faster than human defenses, and how Doppel's platform scans, takes down, and simulates these multichannel threats for hundreds of enterprise customers.
Key Questions Answered
- •Attack Kill Chain Framework: Social engineering attacks follow a predictable sequence—preparation, engagement, and asset seizure (money or data). Defenders should map security tools against each stage rather than treating attacks as isolated incidents. Doppel structures its entire platform around disrupting all three phases simultaneously across domains, social media, phone, and ad networks.
- •Phone Call Vectors Dominate Enterprise Breaches: Groups like Scattered Spider and Shiny Hunters compromise casinos, banks, airlines, and tech companies primarily through phone calls to customer support, IT helpdesks, and HR lines—not email. Security training programs that focus only on phishing emails miss the highest-impact attack vector currently being exploited against large organizations.
- •AI Agent Simulations Run Six-Minute Conversations Undetected: Doppel's offensive AI agent, which it calls Vibe Phishing, conducts deepfake voice calls where targets engage for an average of six minutes without detecting the deception. Organizations should test helpdesk and customer support staff specifically with multichannel simulations—not just phishing emails—because those roles are the primary targets.
- •Out-of-Band Verification Reduces Deepfake Risk Without Technology: When verifying someone's identity on a video call, ask them to show their phone's selfie camera view, pose questions about hyper-local topics, or reference fictional places to test for pre-scripted AI responses. Cross-referencing through a second known communication channel—a verified phone number or LinkedIn message—makes simultaneous multi-platform impersonation significantly harder to execute.
- •Ground Truth Data Scales Defensively: Doppel's business model—charging enterprises directly rather than monetizing ads—gives it verified ground truth on what legitimate brand activity looks like for each client. This data advantage compounds as more customers onboard, enabling more accurate threat detection. Enterprises should prioritize security vendors whose detection models train on verified organizational data rather than generic threat feeds.
Notable Moment
Tian revealed that after Doppel successfully shut down a recurring attack campaign, the threat actors were found complaining on Telegram that the technique was no longer effective—then immediately pivoted to targeting organizations without Doppel coverage, illustrating how deterrence works but never eliminates adversarial adaptation.
You just read a 3-minute summary of a 45-minute episode.
Get Eye on AI summarized like this every Monday — plus up to 2 more podcasts, free.
Pick Your Podcasts — FreeKeep Reading
More from Eye on AI
Loris Degioanni: Why AI Is Breaking Cybersecurity, and What Comes Next
May 6 · 51 min
This Week in Startups
5,000+ Tech Workers Laid Off This Week. It's Just The Beginning. | E2286
May 9
More from Eye on AI
#342 Andrew Thangaraj: The $5,000 IIT Degree: Can India Fix Its Broken Education System?
May 1 · 48 min
Mind Pump: Raw Fitness Truth
2854: The Optimal Sets & Reps at Every Intensity ! Soviet Science Explains
May 9
More from Eye on AI
We summarize every new episode. Want them in your inbox?
Loris Degioanni: Why AI Is Breaking Cybersecurity, and What Comes Next
#342 Andrew Thangaraj: The $5,000 IIT Degree: Can India Fix Its Broken Education System?
#341 Celia Merzbacher: Beyond the Buzzword: The Real State of Quantum Computing, Sensing, and AI in 2025
#340 Steffen Cruz: Training AI Without Data Centres
#339 Eamonn Maguire: Your Child Has a Data Profile Before They're Born
Similar Episodes
Related episodes from other podcasts
This Week in Startups
May 9
5,000+ Tech Workers Laid Off This Week. It's Just The Beginning. | E2286
Mind Pump: Raw Fitness Truth
May 9
2854: The Optimal Sets & Reps at Every Intensity ! Soviet Science Explains
All-In with Chamath, Jason, Sacks & Friedberg
May 8
Elon's Anthropic Deal, The Next AI Monopoly?, "FDA for AI" Panic, Trading the AI Boom
The AI Breakdown
May 8
The Week the AI Story Shifted
The Startup Ideas Podcast
May 8
Hire a team of AI Agents
Explore Related Topics
This podcast is featured in Best AI Podcasts (2026) — ranked and reviewed with AI summaries.
Read this week's AI & Machine Learning Podcast Insights — cross-podcast analysis updated weekly.
You're clearly into Eye on AI.
Every Monday, we deliver AI summaries of the latest episodes from Eye on AI and 192+ other podcasts. Free for up to 3 shows.
Start My Monday DigestNo credit card · Unsubscribe anytime