Wait, Mother’s Day was last week? We promise, we didn’t forget, but we did have just a tiny bit of news to announce and that took center stage. But we’re back, and we’re shaking things up!
In our previous episode you got to meet our Scrum Master, Sandy, where he did a great job knocking out some tough suspicious content, but didn’t walk away with the perfect score. This week we put our sales team member Hayden to the test, and he is fully determined to bring us to our first perfect streak. Unfortunately for him, we changed how all of this works. In past weeks we’d present each of our team members with five suspicious pieces of content so that they can decide if it’s spam, legitimate, or… Is it a Phish.
Like many organizations, sending phishing simulations to employees is a common occurrence. These simulations test employees knowledge, help show if security awareness training is effective, and is also pretty entertaining for the sender. Here at PhishLabs, we get some of the trickiest simulations ever created, and Hayden received a very special one created just for him. Therefore, this week you will only have four suspicious pieces of content to analyze, and then you get to hear how Hayden reacted to his BEC or business email compromise attack.
Have some good examples of phishing lures, sites, or even suspicious spam emails? Send a screenshot to us on Twitter and we may include it in a future episode.
Spoilers ahead! Don’t read on if you plan on playing along.
So how did Hayden do? He had a perfect score of 5 – 0.
And with that we are back to a perfect score! Next week we shoot for our first perfect streak, again.
Did you receive a phishing lure or stumble upon a phishing site? Send it to us on Twitter and we can include it in our next edition of Is it a Phish?
*** This is a Security Bloggers Network syndicated blog from The PhishLabs Blog authored by Elliot Volkman. Read the original post at: https://info.phishlabs.com/blog/is-it-a-phish-mothers-day-edition
Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…
Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…
For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…
It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…
1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…
This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…