An overview of common phishing techniques
Invitation to the 3rd LUCY User Group Conference on September 18, 2019 LUCY CONNECT Conference features industry expert speakers, including keynote by Enterprise Security Experts. Sessions focused on latest security trends and experience sharing between the attendees. Bring Awareness to the next Level! Learn more about the LUCY platform and the future of security awareness. Last…
xorlab and Lucy working together Zurich, Zug – The partnership between the two cybersecurity start-ups xorlab and Lucy is intended to provide employees in large companies with even better protection against phishing and other threats. Companies, especially large ones, will systematically train their employees to recognize dangerous e-mails and to act accordingly. The Zug-based company…
LUCY Security AG at booth #13 GISEC (https://www.gisec.ae/) from 1–3 APRIL 2019 | DWTC, UAE
Legality of Using Third-Party Marks in Phishing Simulations and Educational Presentations on Phishing
This article addresses the legality of displaying third-party trademarks or service marks as part of an educational phishing simulation or educational presentation on phishing attacks made available for use by employers through software offered by Lucy Security AG (“Lucy”).
As 2018 drew to an end, many cybersecurity reports published their findings on the most common types of attacks that targeted small and large organisations. Let’s take a closer look at an evergreen method of cybercrime, social engineering and more specifically phishing.