AI Vishing Attack: analysis of a new threat
Vishing Awareness Training: train your employees against vishing
Callback vishing: when phishing leads to vishing
Voice cloning attacks: all you need to know
The Slovakia Election Deepfake: AI’s Threat to Democracy
The Le Drian Scam: A Masterclass in Social Engineering
Social Engineering Attacks: Tactics and Defenses
Social Engineering Examples: Real-World Tactics
How to Run a Simulated Vishing Attack? Our complete guide.
Bypassing Multi Factor Authentication (MFA) with a callbot
Domain Doppelgängers: Identifying and Protecting Against Domain Spoofing
AIDS Trojan Analysis: Early Malware Case Study
Remote Access Trojans: Risks and Remediation
Ransomware Simulator: Testing Your Defenses
Locky Ransomware Explained: Protection Strategies
Bad Rabbit Ransomware: Understanding the Threat
WannaCry Ransomware Attack: A Case Study
Ransomware Definition: What is it & How to Secure your Data?
Ransomware Attacks: Effective Defense Strategies
Regulatory Compliance: Adhering to Laws and Regulations
HIPAA (Health Insurance Portability and Accountability Act) Compliance
Compliance Risk: Identification and Mitigation
Compliance Monitoring: Ensuring Policy Adherence
Compliance Management: Effective Strategies
CCPA (California Consumer Privacy Act) Compliance: Complete 2024 Guide
IT Compliance: Navigating Regulations in Tech
What is a VPN and How Does It Work?
What Does VPN Stand For? Understanding Its Use
VPN Definition: Virtual Private Networks Best Practices
Examples of Data Breaches and Lessons Learned
Data Breach Response and Prevention Strategies
How Do People Get Doxxed? | Risks and Prevention Tips
Pretexting Definition: The Art of Deceptive Information Gathering
What is Pretexting? | Understanding Social Engineering
SSTP: Secure Socket Tunneling Protocol Explained
Enhancing DNS Security: Best Practices
SMTP Relay: Facilitating Efficient Email Delivery
Sendmail: Configuring Email Servers for Security
Typosquatting: How Misspellings Can Lead to Fraud
Social Engineering Definition: Cybersecurity Best Practices
PII Meaning: Definition of Personal Identifiable Information
Watering Hole Attacks: Identification and Prevention
DNS Meaning: What Does DNS Stand For?
What is Doxxing? | Understanding Online Exposure
PII (Personal Identifiable Information): How to Protect Your Privacy?
Which type of phishing simulation to choose?
How to launch a phishing simulation to better protect your company?
Employee Phishing Training: Building Defense Skills
Phishing Training: Essential for Employee Security
Phishing Awareness: Educating to Prevent Attacks
Quishing: When Phishing Meets QR Codes
DMARC Explained: Securing Email Integrity
DMARC Checker: Validate Your Email Protection
What is DKIM? Understanding Email Authentication
DKIM Checker: Verify Email Security
Common Phishing Indicators: Recognizing Red Flags
Types of Phishing Attacks: A Comprehensive Guide
Understanding Spear Phishing: Focused Cyber Attacks
Spear Phishing Definition: Targeted Email Threats
Spam vs Phishing: Definitions and Differences
Smishing vs Phishing: Definitions and Differences
Navigating Phishing Scams: Avoidance Techniques
Examples of Phishing Emails and Prevention Tips
Identifying Phishing Emails: What to Look For
Phishing Detection: Tools and Techniques
How to Spot a Phishing Email: Key Indicators
How Phishing Works: Mechanisms and Prevention
Facebook Phishing: Protecting Your Profile
Phishing Email Examples: Spotting the Signs
TOP 5 Common Indicators of a Phishing Attempt
Clone Phishing: Recognize and Avoid
Check Phishing Link: How to Verify Safe URLs
Vishing Definition: Voice Phishing Techniques
What is Vishing? | Protecting Against Phone Scams
What is Catfishing? | Identifying Online Deception
Catfishing meaning: Definition & Examples
What is Spoofing? | Cybersecurity Risks
Spoofing Definition: How It Threatens Security
How to Prevent Spoofing: Strategies & Best Practices
Impact of AI on Cyberattacks in 2024
How Klaxoon uses Arsen to train its employees against phishing attacks
Phishing & AI: new attacks and new solutions
Malicious Attachment generation with generative AI
Generative AI Phishing Scenarios
Using third party LLMs for genAI phishing operations
Defense in depth: the importance of the human factor
3 advantages Arsen has over Gophish
Alternatives to GoPhish for Comprehensive Phishing Simulations
Use of AI in Social Engineering Attacks
The Multi-Scenario Campaigns
Our most versatile phishing scenarios
USB Drop: Discover the USB drive powered attack
"OVH: Domain suspension", analysis of the phishing campaign
How to customize a scenario with Arsen?
How to report a fraudulent email?
How to effectively raise awareness against phishing?
Choosing the right schedule for your phishing simulations
The cybersecurity of nomadic remote work
Companies: How to secure teleworking
How to effectively raise awareness against phishing?
What is phishing? Cyberattack's most popular initial access vector
What are the results to observe during a phishing simulation?
Why generate a random password?
How to properly manage your passwords
What is Juice Jacking ?

What is Juice Jacking ?

Juice jacking is a type of cyber attack...

General cybersecurity recommendations for businesses
Classification of the difficulty level of phishing
Click campaigns: lightweight phishing simulations to train people
Lessons learned from over 30,000 phishing simulations
Successfully conducting a phishing simulation
How to train your collaborators following a phishing simulation?
Good practices of personal cybersecurity
Defeating Multi-factor Authentication through a Simple Phishing Email
Solutions against ransomware: how to protect, prevent and fight them
What is Cryptolocker? Presentation, infection and defence strategies
How often to conduct phishing simulations?
Phishing: How does Monisnap protect itself?
Emotet: the malware that disrupted the private sector for 7 years.
What is catfishing, and how to protect from it?
WannaCry, the biggest ransomware heist in history
Managing the risks tied to phishing
BEC Definition: Understanding Business Email Compromise
Instagram Phishing: Risks and Protection Measures
The slow but steady evolution of phishing attacks
Cybersecurity and work from home
Why are you losing money with your awareness solution?
What to do after a phishing simulation?
How does a phishing test take place?
What is social engineering?
What is Smishing? Definition, mechanisms, identifcation and examples
Managing Campaigns as a Team.
Securing telecommuting: the complete guide
"Browser in the Browser": A New Variant of Phishing
How to assess your risk when faced with phishing?
The phishing of Instagram accounts
Why carry out phishing simulations with groups of employees?
Vishing examples: real world attacks and consequences

Protect Your Business Against Phishing

Discover how our phishing simulations can effectively reduce your human attack surface.

Request a Demo