Keep your people aware with real-life cybersecurity attacks simulated right on their devices

Daily Threats





More than 90% of the successful cyber-attacks are exploiting the human weakness and no business is immune. While many big scale organizations invest considerable amounts of money in cutting-edge technologies trying to prevent the incidents, they prove ineffective in acting at the basic level, the human factor. Attack simulator has been born with the aim to correct this weakness: with an Attack Simulator account, your company can conduct Email and Windows attacks simulations as an effective way to enhance interactively your employees’ security awareness and susceptibility to social engineering tactics.

Prepare against

The e-mail attacks constitute the principal vector used in a large range of advanced malware, from ransomware to APTs. It addresses the primordial vulnerability of the weakest link of the security chain, the human nature. Therefore, we consider that this is the critical point of entry where appropriate education and training might make a difference. Attack Simulator brings your employees the freshest simulations of phishing, fraud, identity theft, ransomware and targeted phishing (spear) developed in collaboration with the most advanced experts in anti-phishing and anti-malware.


Ransomware is a type of malware that is denying the access of computer users to their data,
by encrypting it using advanced algorithms and asking a RANSOM to decrypt it. More than 80% of known ransomware come through e-mail, using social engineering techniques. Your users and their data are one click away from disaster.


Phishing is an attack type aiming to collect sensitive information such as usernames, passwords, credit card details or other personally identifiable information by disguising as a trustworthy entity using a pair of e-mail & website specially crafted. The data is used furthermore for financial gains (used in Internet banking or sold on the Dark Web markets) or for identity theft.

Identity theft

The online fraud is a type of fraud that makes use of the Internet and social engineering with the aim to trick the users perform actions in the benefit of the fraudster. The online fraud may appear in various forms, from e-mail spam to various scams like the charity messages, online ticket frauds, gambling and special offer frauds, as well as authorities fake messages.

Prepare against

We call desktop attacks the attacks that are using the classic native Windows (and other OS) messages, java scripts, web messages in order to trick the users to install malicious code, as well as trigger other vulnerabilities exploited by fake AdobeFlash installers, infected social network applets and weblets, browser extensions, downloaders and other “browsing experience enhancers”. Our training messages are so close to the original ones that can fool even experimented users; this way we prepare your people to identify and react to even most evolved attacks in the wild.


The malware is a generic term used to refer to many forms of malicious software, that include computer viruses, worms, Trojan horses, bots, backdoors etc. It can come in the form of executable files, injectable code, scripts, infected web objects, active content and many other forms. It is definable by its malicious intention, acting against the interests of the computer user and altering the normal behavior of the applications and operating systems.


The adware is also a generic term for malicious computer programs designed to display advertising on a system – visual or invisible to the user – for financial gains, but also to intercept and redirect the Internet searches to websites that display ads; another action characteristic to adware is to gather and send information about the browsing experience such as searches, history, preferences, formats etc, with the user’s consent.


The spyware denominates the software components that have the objective of gathering information about the computer user or the organization and sending it to another person or entity without the user’s consent. Spyware programs come in various formats, the most known being the keyloggers, system monitors, tracking cookies, trojans, rootkits, web beacons etc.