Phishing Simulation

Phishing security test tool

Badge Surfer Attack – Physical Security – SAUDI ARAMCO BREACH

Badge Surfer Attack – Phishing security test  tool – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 1, SAUDI ARAMCO BREACH In our 1st Episode of Season 2, one of the world’s largest oil producers has roughly 35,000 of its computers shut down in a matter of hours due to [...]

Read more...
Phishing attacks

Antivirus Tools Can’t Stop Phishing Attacks

Phishing attacks have been a pressing issue due to their success rate.  Antivirus tools /anti-virus software can identify known threats and contain them, however, when using social engineering tactics, like pushing or spear-phishing attacks, malware can bypass anti-virus technologies and it can take hours for antivirus technology vendors to [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...
Phishing Awareness Training

Phishing Awareness Training: 12 Things Your Employees Should Know for Phishing Protection

Phishing Awareness Training: 12 Things Your Employees Should Know for Phishing Protection Phishing attacks have been a widespread problem, posing a huge risk to individuals and institutions. According to Garner, According to Gartner, phishing emails will continue to be the primary method used by advanced attacks.  Because it is simple [...]

Read more...
phishing training for employees

Phishing training for employees

Phishing training for employees Is phishing your own employee a necessity ? The answer is yes.  Because phishing is one of the most successful ways cyber criminals access to companies’ passwords and other security credentials. Cyber criminal impersonate a legitimate person or entity, sends a fake email to manipulate employees [...]

Read more...
Phishing Software

Phishing test software

Phishing test software No matter how secure your network, or computers system and softwares, the weakest link in security posture,  people element can be exploited. Via phishing techniques, the most common social engineering techniques used in cyber attacks, it is easy to impersonate people acquainted, and get the information needed. [...]

Read more...
Data Breach: covert redirect

Data breach: covert redirect

Covert Redirect is a security breach and occurs when cyber hackers use open routing. Open redirects are not successful in checking whether the redirected URL is a valid URL. Cybercriminals who use covert redirect take advantage of this weakness, open a fake login window, steal login information, and redirect [...]

Read more...
Keepnet Labs Presentation (Basic)

Phishing awareness training powerpoint

Powerpoint Training Modules / HTML5  based interactive trainings As technology grows, eLearning industry  also evolves. To make the trainings more effectice curriculum becomes more interactive. Moreover,  number of online learners using mobile devices to access eLearning courses increases. Due to variety of features, HTML5 eLearning authoring tools are used by [...]

Read more...
Phishing awareness training

Phishing awareness training

Phishing awareness training Creating awareness among employees against phishing attacks and its consequences is the key to an organisation’s cybersecurity posture. Phishing emails remain a primary weapon of the cybercriminals. They use techniques that are continually evolving, focusing on human the tendency to make mistakes or gain financial profit. Today, 90% of [...]

Read more...
Phishing awareness email template

Create awareness among employees by using different email templates

Phishing awareness email template Email is an important part of our everyday communication. It has been in every part of our personal and business life. Therefore it has also become one of the most common tools that cybercriminal use to attempt to seize sensitive data. Today, more than 90% of [...]

Read more...