Skip to content

security training

7 posts with the tag “security training”

AI-Powered Phishing: How LLMs Help Attackers Write Better Lures

AI-powered phishing - LLM neural network generating targeted phishing emails to multiple victims

A phishing email arrives in your inbox. It references a project you’re working on, names your manager correctly, mimics the writing style of your IT department, and asks you to verify your credentials after a “suspicious login from São Paulo.” No typos. No awkward phrasing. No generic “Dear Customer” greeting. It reads exactly like a legitimate message from your company.

Two years ago, writing this email required a human attacker who spent hours researching your organization, your role, and your communication patterns. Today, an LLM produces it in seconds. Feed it a few LinkedIn profiles and a sample company email, and it generates dozens of personalized variants, each tailored to a different target, in any language.

This is why traditional phishing detection advice about spotting grammatical errors and suspicious formatting is becoming unreliable. The signals employees were trained to look for are disappearing.

Deepfake Social Engineering: When You Can't Trust Your Own Eyes

Deepfake social engineering - split view comparing a real person and their AI-generated deepfake clone

Your CFO joins a video call with the Hong Kong finance team. She asks them to execute a series of wire transfers totaling $25 million. Her face, her voice, her mannerisms. The team complies. The entire call was a deepfake.

This happened to Arup, the British engineering firm, in early 2024. The attackers recreated the CFO and several other executives using publicly available video footage. Every person on that call except the target was synthetic.

Shadow IT: The Security Risks Hiding in Your SaaS Stack

Shadow IT security risks - unauthorized cloud apps orbiting a corporate server, connected by warning-flagged data flows

A product manager signs up for an AI writing tool using her corporate email. She pastes the company’s Q3 roadmap into it to help draft a press release. The tool’s terms of service allow it to use input data for model training. Three months later, a competitor’s analyst finds fragments of that roadmap in the tool’s outputs.

Nobody approved the tool. Nobody reviewed its privacy policy. Nobody even knew it existed on the network until the legal team got a call.

Open Source LMS for SCORM Training: 5 Platforms Compared

Open source LMS platforms for security awareness training comparison

Open source sounds appealing. No licensing fees. Full control. Customization freedom.

But “free” software isn’t free. Before committing your security awareness training to an open source LMS, you need to understand what you’re actually signing up for. This guide covers the real tradeoffs, platform-by-platform comparisons, and the math that determines whether open source makes sense for your organization.

Phishing Simulation Training That Reduces Click Rates

Phishing simulation training - email with fishing hook representing simulated attacks

Every organization trains employees to recognize phishing. Most still get breached anyway.

The problem isn’t awareness. It’s application. Employees who ace multiple-choice quizzes about phishing indicators still click malicious links when those links arrive in their actual inbox. The gap between knowing and doing is where breaches happen.

Phishing simulation training closes that gap by creating controlled practice opportunities. Instead of telling employees what phishing looks like, simulations show them and measure whether training translates to behavior.

BEC Training: Stop Business Email Compromise

Business email compromise training - email with dollar sign representing wire fraud

$50 billion. That’s what business email compromise (BEC) attacks have stolen since the FBI Internet Crime Complaint Center (IC3) started tracking them. The average loss per incident is $125,000 according to FBI IC3 data, though some organizations lose millions in a single attack.

Here’s what makes BEC particularly frustrating to defend against: there’s no malware to scan, no suspicious attachment to sandbox, no sketchy link for your email gateway to flag. These attacks work by impersonating someone the target trusts, asking for something that sounds reasonable, and relying on normal business processes to deliver the money.

Your technical controls won’t catch them. Your employees have to.

SCORM Security Awareness Training: LMS Setup Guide

SCORM security training - puzzle pieces representing LMS integration

Most security awareness programs die in the LMS. Not because the content is bad, but because someone bought training that doesn’t talk to their platform. SCORM exists to solve that problem, and when it works, it works well. When it doesn’t, you spend three weeks in a support ticket thread trying to figure out why completion data isn’t syncing.

This guide is for the person who needs to get SCORM security awareness training deployed, tracked, and reported on without turning it into a six-month IT project.