Cyberdise AG

Author : admin

Why Hackers Love Your Social Media – and How to Stop Them

In today’s hyper-connected digital world, information is power. Unfortunately, this power isn’t just in the hands of the good guys. Cybercriminals are increasingly turning to Open Source Intelligence (OSINT) to fuel their attacks, particularly phishings. By exploiting publicly available information, attackers can craft highly personalized and convincing scams that are harder to detect and resist.

Investors for CYBERDISE Awareness? – Why We Are Looking for Capital

A great awareness solution for complex needs – What began a year and a half ago as a business idea for AI-driven awareness tailored to more complex customer needs has truly made an impact! CYBERDISE now trains and tests over 40,000 users. With the latest version 2.5, we have demonstrated that our solution is competitive and is licensed by reputable large clients and partners.
Specialized cybersecurity service providers and larger organizations have unique requirements for their cybersecurity awareness programs. CYBERDISE effectively meets complex and specialized security awareness training needs.

The Psychology of Phishing Attacks

Have you watched “The Great Hack” movie? A must-watch for insights into the psychology behind phishing attacks! Psychology and Phishing Attacks Phishing attacks rely heavily on psychological tricks, which is why understanding these tactics is so important for cybersecurity awareness. Surprisingly, nearly half (47%) of successful attacks still happen because of careless employees [1]. The[…]

Cyberdise Version 2.1 – Enhanced Security and Usability Features

Cyberdise Version 2.1 – Enhanced Security and Usability Features Release V2.1.0 New Features 1. File-Based Attacks Campaign operators can now integrate HTML files into phishing simulations,whether as email attachments or links to websites. This functionality enhances the monitoring of download activity, providing valuable insights into user behavior and potential security vulnerabilities. 2. O365 Incident Reporting[…]