LUCY Relase 3.2 is available in November 2016

Bam! LUCY V3.2 is out with awesome corporate features

Dear LUCY Users,

Phishing Incident Plugin for Outlook and LDAP Integration – Only six weeks after Version 3.1 we’re shipping already LUCY Release V3.2! Why? Because we wanted it so! Big customers and large corporate prospects asked us to provide more corporate features. And we put them in this release!

Analyzing a malware simulation report from LUCY

Malware screencast 5/5 – How malware simulations are reported: Example of a vulnerability scan report.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Screencast showing how a ransomware simulation is run with lucy, this is a tutorial video

Malware screencast 4/5 – Setting up a ransomware attack simulation (harmless) – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Different Malware Types can be simulated with LUCY - Tutorial Screencast

Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Tutorial showing how to execute a malware simulation - This is a LUCY screencast

Malware screencast 2/5 – Executing a malware simulation with LUCY. A harmless vulnerability scan is run.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Set up a malware simulation with LUCY - This screencast tutorial shows how a malware attack simulation is created

Malware screencast 1/5 – Setting Up a Malware Testing Toolkit Simulation – LUCY Server

More than a quarter of Downloads in German Speaking Areas to an Article in German Press in October 2016

The IT Security Community is a Global One – LUCY Software Downloads in October ’16

v31-important-release-information-lucy

Important things to consider when upgrading to LUCY V 3.1

v31-new-release-lucy

New release: LUCY V 3.1 is a big leap forward

Examples of variables for spear Phishing simulations

Extended Spear Phishing Capabilities with LUCY Server