Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn’t attack technology first—it attacks how people make decisions. In many incidents, the […]
Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn’t attack technology first—it attacks how people make decisions. In many incidents, the […]
El phishing sigue siendo la puerta de entrada más frecuente de los ciberataques. Un solo correo malicioso que no se detecta a tiempo puede desencadenar un incidente grave. Pero también […]
In a digital ecosystem saturated with threats—where human error remains the most common attack vector—it is no longer enough to rely solely on firewalls, EDRs, or traditional monitoring. Modern security […]
In this post, I compile some of the recommendations that, in my personal opinion, I find most important when simulating Phishing. In this post, I assume that the executives of […]
No matter where you are, just look up, and you’ll find the tower. Its presence is constant and overwhelming. It casts a sense of watchfulness and malevolence that extends far […]
Our CEO asked – somewhat rhetorically – on LinkedIn: What are the chances of launching a phishing simulation and getting it right the first time? There are many well-known reasons […]
In some cases, evident: In others, imperceptible: False positives in simulations are here to stay. It is a reality faced by virtually all organizations that simulate Phishing, Smishing and Ransomware. […]
The objective of this workshop is not only to show the functionality differential of SMARTFENSE from its competitors, hiding software-affected statistics (false positives), but also explaining the whole context in […]