ATTACK Simulator HOW Tos

No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.

Social engineering: what it is and 10 examples of these attacks

Social engineering: what it is and 10 examples of these attacks

Social engineering is a type of manipulation based on tricking the user through different malicious activities to secretly provide private information like passwords and bank account information or access your device to install malware (malicious software). These...

Top 4 Popular Phishing Examples Most People Would Fall For

Top 4 Popular Phishing Examples Most People Would Fall For

This post will walk you through 4 Phishing Examples that will help you and your employees recognize phishing attempts more easily. Phishing attacks have become more and more creative, subtle, and harder to tell from the real deal. The bad guys never sleep, but neither...

Phishing and Safe browsing: 5 tips to avoid fake web pages

Phishing and Safe browsing: 5 tips to avoid fake web pages

As 2020 has proven, the more time we spent on the Internet, the more chances we have to fall for phishing attacks. In this context, safe browsing has become vital in protecting users from phishing and malware. Phishing – as old as the Internet Starting with scammers...

14 Phishing Techniques Your Employees Need To Be Aware Of

14 Phishing Techniques Your Employees Need To Be Aware Of

The Internet is a wonderful place where you can find answers to almost anything, but nasty threats lurk in its dark corners, waiting for the perfect victim to "phish." Phishing techniques are becoming sneakier and more sophisticated as technology becomes more...

Smishing 101: Definition, Types, and Precautions

Smishing 101: Definition, Types, and Precautions

Smishing is a phishing method that has gained popularity lately, especially in the COVID-19 pandemic context, but it's been around way earlier, as opposed to what most people tend to assume. Smishing targets victims by using a more direct route than an e-mail or...

Security Awareness Training: 6 Key Compliance Requirements

Security Awareness Training: 6 Key Compliance Requirements

Personal data protection is a matter of utmost importance in the ever-growing digital world With the ever-growing cyber threats and costly attacks, legislative bodies have established international standards and regulations to compel IT organizations to provide...

Security Awareness Training: 4-Step Phishing Simulations

Security Awareness Training: 4-Step Phishing Simulations

What you don't know can't hurt you, right? Wrong. At least, when we're talking cybersecurity. The first and most crucial step in protecting your business from phishing attacks is acknowledging their existence and being able to recognize them. Nowadays, security...