Cyberdise AG

Blog

Customer-img

What CUSTOMERS DO WRONG When Starting Cybersecurity Awareness Programs

Common possible missteps on customer-side in implementing Security Awareness projects

It’s like any other project: you think it’s too easy, you don’t listen or listen to the wrong experts, you think you’ll master it, or you think you can do it alone, you don’t talk to each other enough and the goals and requirements are not as clear as they should be. If you then start with an inappropriate mindset and management fails to recognize the purpose, value and benefits of awareness, then the project can get off to a very bumpy start.

product-img

Is It Really Easier When Product-Market Fit Is Achieved? Well…

Conversely, does this mean that once you have achieved product-market fit, you can start scaling immediately and you are sure to be successful? I would say: maybe, probably not.

Yes, 9 out of 10 start-ups fail. And yes, most of them probably failed because they offered something that the market didn’t really want. But I do have some reservations about the rest becoming successful because the PMF has been reached.

Investors and Founders - IMG (1)

Reverse Investment Pitching is Pointless, Even if It Would Be Brilliant.

Company founders pitch investors to get funding and other help for their business idea. Reverse pitching turns the tables: the investors, business angels and VC’s apply to the startup entrepreneurs to be allowed to invest in their companies.

Is this a good idea? No and yes ☺

Can AI detect malicious - IMG

Can AI Detect Malicious Intent in an Email?

Phishing emails are becoming harder to detect, even for humans. A recent study tested various large language models (LLMs) for their ability to recognize malicious intent in emails, revealing significant differences in performance.

One standout was Claude 3.5 Sonnet, which scored over 90% at low false positive rates and even flagged suspicious emails that humans overlooked. When explicitly asked to assess suspicion, it correctly classified all phishing emails while avoiding false alarms on legitimate messages. However, it struggled with conventional phishing emails, achieving only an 81% true-positive rate in that category…

IBM-img (1)

What the 2025 IBM Data Breach Report Really Tells Us

The IBM Cost of a Data Breach Report has been published every year for two decades.

It’s often read for the numbers: the global average breach cost (now $4.4M), the top industries, or the fines (which in the U.S. push average costs to $10M).

But look a little deeper and with your own expert-view, and this year’s report says something more fundamental about cybersecurity awareness.

Risk illustration

Risk Attitude vs Risk Behavior: Are You Training the Wrong Thing?

Despite comprehensive security awareness training, many organizations still continue to have cybersecurity breaches resulting from human error. We believe that it is because many people understand cybersecurity threats in theory but struggle to apply the knowledge in practice consistently to act safely.

This gap between risk attitude (knowing what is risky) and risk behavior (actually acting securely) is what today’s article will be about 😉

The Rocky Road to Reducing Human Error

The Rocky Road to Reducing Human Error (M&S Lost £300M to Phishing, May 2025)

The Marks & Spencer Cyber Attack shows it. Large companies with complex organizations, many languages, multiple LMS systems, heterogeneous metadata landscapes and high process variance need cybersecurity awareness solutions that are designed to meet such challenges. Otherwise, employee awareness of cyber risks will degenerate into a farce or there is a risk of group-wide failure.

Blog-IMG

The biggest cyber heists in history: The bybit, MGM and Sony hacks – similarities, effects, damage and awareness potentials

The similarities and differences are impressive – in our irregular series ‘The biggest cyber heists’, we look at the biggest cyber heists in history. Today’s post analyzes the bybit, MGM and Sony hack. We summarize what happened, how it happened, who noticed it, what damage was done and what the consequences were. We then examine what measures would have been useful to counteract this and whether something could have been done with more vigilance.

V2.6

Why Hackers Love Your Social Media – and How to Stop Them

In today’s hyper-connected digital world, information is power. Unfortunately, this power isn’t just in the hands of the good guys. Cybercriminals are increasingly turning to Open Source Intelligence (OSINT) to fuel their attacks, particularly phishings. By exploiting publicly available information, attackers can craft highly personalized and convincing scams that are harder to detect and resist.

Invest in Cyberdise Awareness Header Image

Investors for CYBERDISE Awareness? – Why We Are Looking for Capital

A great awareness solution for complex needs – What began a year and a half ago as a business idea for AI-driven awareness tailored to more complex customer needs has truly made an impact! CYBERDISE now trains and tests over 40,000 users. With the latest version 2.5, we have demonstrated that our solution is competitive and is licensed by reputable large clients and partners.
Specialized cybersecurity service providers and larger organizations have unique requirements for their cybersecurity awareness programs. CYBERDISE effectively meets complex and specialized security awareness training needs.

Blue_and_White_Charity_Day_Email_Header_38

Cybersecurity in Elections – Is Fake News a National Attack?

The U.S. presidential election was hit with billions of cyberattacks. 6 billion, to be exact. Fake news, phishing scams, deepfakes – you name it. Somehow, though, things held up.
Now, Germany’s snap election is just weeks away, and experts are already sounding the alarm. Phishing attacks are on the rise. Disinformation is spreading. Fake news isn’t just background noise anymore – it’s being used to manipulate public opinion and mess with democracy.

The image show the netflix movie named Carry-on

Cyber Lessons from “Carry-On”: Are You the Target?

While “Carry-On” primarily focuses on physical security in an airport, its themes resonate deeply with today’s cybersecurity challenges. To us, the movie serves as a stark reminder of how vulnerabilities – both technological and human – can be exploited with devastating consequences. Let’s explore key moments

GDPR-NIS2-ISO-BG

GDPR vs NIS2 vs ISO 27001: Is There Any Difference?

GDPR vs NIS2 vs ISO 27001: Key Differences Explained. Compliance isn’t just a buzzword – it’s a cornerstone of trust, security, and resilience. But navigating the differences between GDPR, NIS2, and ISO 27001 can feel like solving a puzzle. What do you need to know, and why does it matter? Let’s break it down.

Psychology and Phishing Attacks BG

The Psychology of Phishing Attacks

Published Date: December 5, 2024 Have you watched “The Great Hack” movie? A must-watch for insights into the psychology behind phishing attacks! Psychology and Phishing Attacks Phishing attacks rely heavily on psychological tricks, which is why understanding these tactics is …

Blue and White Modern Cyber Security Service Banner 13

Why Today’s Phishing Exercises (Simulations) Are Mostly Stupid?

Why Today’s Phishing Exercises (Simulations) Are Mostly Stupid? Published Date: November 4, 2024 The “Cybersecurity Awareness” Paradox There’s something almost ironic about cybersecurity awareness: on one hand, cybersecurity is the lifeline that can make or break a company in the …

imqjrfkqfqage

Beware of Quishing: The Rise of QR Code Phishing Scams

Beware of Quishing: The Rise of QR Code Phishing Scams Published Date: September 22, 2024 Beware of Quishing – The New Phishing How scammers hide harmful links in QR codes you are scanning Have you ever scanned a QR code …

Blue and White Modern Cyber Security Service Banner (9)-min

THE Universal Simulation and Awareness Solution: Cyberdise 2.0

The Universal Simulation and Awareness Solution: Cyberdise 2.0 Published Date: September 10, 2024 Cybersecurity Awareness Meets AI – THE Universal Solution You Need Protect Your Organization by Empowering Your Employees Cyber threats are evolving rapidly, and your organization’s defense starts …

Subscribe To Our Blog