It's done in two minutes - create a phishing scam simulation with LUCY. A webcast

Create and Execute a Phishing Scam in 2 Minutes – Simulations with LUCY

Send out a Ransomware Simulation in just two Minutes - LUCY Tutorial and screencast

It Takes You 2 Minutes to Create and Send Out a Ransomware Simulation

LUCY Relase 3.2 is available in November 2016

Bam! LUCY V3.2 is out with awesome corporate features

Dear LUCY Users,

Phishing Incident Plugin for Outlook and LDAP Integration – Only six weeks after Version 3.1 we’re shipping already LUCY Release V3.2! Why? Because we wanted it so! Big customers and large corporate prospects asked us to provide more corporate features. And we put them in this release!

Analyzing a malware simulation report from LUCY

Malware screencast 5/5 – How malware simulations are reported: Example of a vulnerability scan report.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Screencast showing how a ransomware simulation is run with lucy, this is a tutorial video

Malware screencast 4/5 – Setting up a ransomware attack simulation (harmless) – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Different Malware Types can be simulated with LUCY - Tutorial Screencast

Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Tutorial showing how to execute a malware simulation - This is a LUCY screencast

Malware screencast 2/5 – Executing a malware simulation with LUCY. A harmless vulnerability scan is run.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Set up a malware simulation with LUCY - This screencast tutorial shows how a malware attack simulation is created

Malware screencast 1/5 – Setting Up a Malware Testing Toolkit Simulation – LUCY Server

More than a quarter of Downloads in German Speaking Areas to an Article in German Press in October 2016

The IT Security Community is a Global One – LUCY Software Downloads in October ’16

v31-important-release-information-lucy

Important things to consider when upgrading to LUCY V 3.1