Skip to content
Simulated phishing attacks provide an effective way to help identify, track and measure weaknesses and improvements in your security program as they relate to phishing and social engineering. Phishing simulation can also help you identify which types of phishing attacks are most successful against your organization and which groups of employees to focus more on as part of your security awareness training efforts. There are several ways to run phishing simulation exercises across your organization.
The annual release of the Verizon Data Breach Investigations Report (DBIR) is personally one of my most anticipated “news” releases of the year since 2016. It’s a great opportunity to take a macro and micro view of how cybersecurity is impacting our social and economic activities in a format that lends itself well to answering nuanced questions. This year’s report definitely extrapolates trends from previous years and the purpose of this opinion piece is not to tell you how bad phishing and social engineering is — we all know that.
Today, we’re excited to unveil the newest feature in PhishDeck, Target and List data export. The name suggests how simple this new feature really is – you can now export in addition to the already existing Campaign results export, you can now also export Target and List data in both CSV and JSON. The new data export features in PhishDeck now allow you to easily export per-Target or per-List data for further analysis for using spreadsheet applications, or any other application or bespoke script that accepts CSV or JSON input.
Humans aren’t great with passwords – specifically, in creating strong, random, unique passwords and keeping them private. This leads to issues ranging from account takeovers (when an attacker takes control of a victim’s account by obtaining their password), to financial scams and identity theft (when goods or services are bought or sold using a stolen identity), to data breaches and other security incidents. The truth is that we suck at passwords because passwords are in many ways, flawed.

What is Phishing Simulation?

Phishing simulation, also referred to as a phishing test, is used to test how susceptible an organization is to phishing. More importantly, phishing simulation allows organizations to prepare how to respond in the event of a real attack. Phishing simulation typically involves recipients, or targets, within an organization receiving a simulated phishing email that is intended to mimic a real phishing attack. Typically, like real phishing emails, phishing simulation emails are intended to trick their target into performing some action at the request of an attacker.
Two-factor authentication, commonly shortened to 2FA, or referred to as two-step verification, dual-factor authentication or multi-factor authentication; refers to the process whereby users are asked to verify their identity using more than one (typically two) authentication factor. The purpose of using two-factor authentication is to prevent an attacker who has compromised a user’s password from being able to log into an account – the attacker will need to get past the second factor of authentication in order to successfully log in, drastically reducing the chances of the user’s account being taken over.

Phinn: On engineering a real-time phishing simulation proxy

Advanced phishing attacks are becoming increasingly commonplace with tools that allow attackers to harvest credentials, bypass Two-factor authentication (2FA), as well as run automated post-exploit scripts the instant you enter your credentials. This post takes a look at our journey towards releasing Phinn, the real-time phishing simulation proxy that sits at the core of the PhishDeck phishing simulation platform. The Problem In recent years we have seen a dramatic surge and shift in the phishing landscape that we have not seen in a very long time.
For better or for worse, passwords play an integral role in authenticating us in almost every conceivable application we use. Whether it’s logging onto your computer, checking your email or using a CRM, chances are you needed to enter a combination of a username/email address and a password often referred to as credentials. The combination of a username and a password is important – a username alone is incomplete without a password and vice versa.

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC), sometimes also referred to as “CEO Fraud”, is nothing but a modern twist on the financial scams of old. Cybercriminals engaging in BEC attacks rely on social engineering techniques such as phishing and spear-phishing, sometimes combined with credential harvesting and other attack patterns, to masquerade as an important company figure requesting information or the completion of an action by a lower-level employee. At its heart, Business Email Compromise (BEC) is a deception game.

PhishDeck helps GiG improve phishing awareness efforts

Testing your company’s susceptibility to phishing isn’t something you can put off anymore. PhishDeck does phishing simulation quickly and effectively. iGaming B2B provider and industry titan Gaming Innovation Group (GiG) has been using PhishDeck to simulate advanced phishing campaigns since the beginning of 2019. Gaming Innovation Group (GiG) is a leading iGaming technology company, providing solutions, products and services to iGaming Operators. Founded in 2012, Gaming Innovation Group’s vision is ‘To be the industry-leading platform and media provider delivering world-class solutions to our iGaming partners and their customers’.