How To’s: Your go-to when in doubt

No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.

Learn how to quickly get the hang of ATTACK Simulator

You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:

 

  • How to get started
  • How to create your first simulation
  • How to whitelist
  • How to understand reports
April 2021 Release

April 2021 Release

Our latest release comes packed with amazing features, like SMiShing simulations, Sender Identity and many more.

Zoom Snooping: How Body Language Can Spill Your Password

Researchers found a way to read what people are typing during a video call (via Zoom, Microsoft Skype or Google Hangouts) by analysing shoulder movements.  Since most users are typically doing other stuff while on video calls and a lot of those tasks involve typing, a...

Joe Biden: Ransomware threat becomes National Security Priority

Joe Biden: Ransomware threat becomes National Security Priority

As the ransomware threat against companies, institutions, and organizations in the U.S. is becoming increasingly present and likely imminent, Joe Biden plans on taking strategic action against it after elevating it to National Security Priority. Biden to set up...

LinkedIn breach with 92% of users’ data exposed

LinkedIn breach with 92% of users’ data exposed

A second massive Linkedln breach exposes the personal data of 700 million LinkedIn users (nearly 92% of the total 756M users). Data has been sold on the dark web, with records including phone numbers, physical addresses, inferred salaries, and geolocation data. Based...

Top 5 ataques de malware más famosos del 2020

Top 5 ataques de malware más famosos del 2020

En los últimos años, la seguridad informática ha sido cada vez más afectada por los ataques de malware de todo tipo. Los ciberdelincuentes se han aprovechado de nuestra confianza y desconocimiento para introducir en nuestras computadoras programas destinados a...

No more “Son, how do I…?” Find your answers here

Computer security can be an intimidating subject. We prepared a few guides to get you started.

  • Introduction to Antivirus Solutions
  • Introduction to VPNs
  • Security when working from home
April 2021 Release

April 2021 Release

Our latest release comes packed with amazing features, like SMiShing simulations, Sender Identity and many more.

Zoom Snooping: How Body Language Can Spill Your Password

Researchers found a way to read what people are typing during a video call (via Zoom, Microsoft Skype or Google Hangouts) by analysing shoulder movements.  Since most users are typically doing other stuff while on video calls and a lot of those tasks involve typing, a...

Joe Biden: Ransomware threat becomes National Security Priority

Joe Biden: Ransomware threat becomes National Security Priority

As the ransomware threat against companies, institutions, and organizations in the U.S. is becoming increasingly present and likely imminent, Joe Biden plans on taking strategic action against it after elevating it to National Security Priority. Biden to set up...

LinkedIn breach with 92% of users’ data exposed

LinkedIn breach with 92% of users’ data exposed

A second massive Linkedln breach exposes the personal data of 700 million LinkedIn users (nearly 92% of the total 756M users). Data has been sold on the dark web, with records including phone numbers, physical addresses, inferred salaries, and geolocation data. Based...

Top 5 ataques de malware más famosos del 2020

Top 5 ataques de malware más famosos del 2020

En los últimos años, la seguridad informática ha sido cada vez más afectada por los ataques de malware de todo tipo. Los ciberdelincuentes se han aprovechado de nuestra confianza y desconocimiento para introducir en nuestras computadoras programas destinados a...