Register for LUCYs Spear Phishing and Malware Setup Webinar on April 11th 2017

Register for our Spear Phishing and Malware Webinar on April-11th!

The current phishing attacks are now becoming more sophisticated and personal. Our experience has shown that the employees of an organization, with appropriate training and phishing simulations can better deal with such threats and this can significantly increase the company’s security. Join our webinar and experience live how to set up, implement and evaluate a personalized […]

phishing-tool-overview-lucy-v33

The ultimate Phishing Tool and even more – LUCY V 3.3 out now!

A completely redeveloped PhishButton, Reports in Microsoft Word format, improved learning management system (LMS) functionalities: LUCY had become the ultimate Phishing Tool (and even more)! And it’s still free for up to 50 Users! Download it now. New Version: The Phishing Tool and its training functionalities Again, we put lot of efforts into our baby. […]

Robert Bosch uses LUCY for Phishing Simulations

Customer Story – Experiences with the use of the LUCY Phishing Awareness Training Server at Robert Bosch

An interview with Patrick Zeller, Senior Manager Enterprise Security, Robert Bosch LLC. March 2017 – “Bosch” is one of LUCY Security’s first major customers. Thanks to its support, the LUCY Phishing and Awareness Training Server was able to develop rapidly. At the beginning of the year 2017, we interviewed Mr. Zeller on the use and […]

copy-existing-webpage-for-social-engineering-scam-simulation-with-lucy

You want to copy an existing Website for a Social Engineering Scam? (Simulation) – We show you how it’s done

After 2 (two!) minutes you have a cloned website for your Phishing Scenario. LUCY Social Engineering Simulation Server empowers you when you set up an IT-Security Awareness Campaign [Screencast]. Advanced Phishing Simulations: Clone a Website and add your own Login Form – Do you want to create a phishing simulation and you want to use […]

download-stats-of-a-phishing-cammpaign-with-file-but-no-sucess-lucy-antiphishing-server

Phishing Reports: How to read and analyze Stats of a Ransomware Simulation or a File based Phishing Attack

How do you read the results of a Phishing Campaign containing an file attachment or even of a Ransomware Simulation? A hands-on example explains how to get campaign insights and how to read LUCY Phishing Reports. The initial situation and the question You prepared a file based phishing scenario. The attachement is a word file […]

LUCY is Winner of the Cyber Security Excellence Awards 2017 - Category Awareness Platform

Yes! – LUCY won it’s Second Award!

After the Info Security Products Guide Gold Winner 2016 we won our second price! LUCY got the “Cybersecurity Excellence Award 2017” in the category “Awareness Platform”. We’re proud of it! We’ve been white hackers and IT-security auditors for 20 years. At this time, we were rather reserved in the communication to the outside. It took […]

Phishing Campaigns with hundred of thousands of users - Robert Bosch is a LUCY Customer

Phishing Campaigns with up to 300,000 recipients – Robert Bosch LLC is a LUCY Customer

Robert Bosch  – “Bosch” is one of LUCY Security’s first big corporate customers. Thanks to its support, the LUCY Anti Phishing and Awareness Training Server was able to develop rapidly. Their Enterprise Security Team is using LUCY since early 2016. Since then they have conducted various campaigns with up to 300,000 users and in more than 10 […]

lucy-phishing-tagline-new-awareness-content-2017

Big Update: Awareness Training and Phishing Attack Templates 02/2017 – IT Security Training reloaded!

Phishing Awareness Content Templates for LUCY Server 01/2017

Phishing Awareness and Attack Scenario Update 01/2017 – Lot of new or improved content!

Books from Verne Harnish, Stephen Covey, Eric Ries, Liz Wiseman, Marshal Rosenberg and Christoph Mathis for building a better business: Lean Startup, Non Violent Communication, Scaled Agile, Scaling Up and Multipliers

For Accelerators, Multipliers and Entrepreneurs – The Books we read in 2016

It is important that you don’t only focus on Tech skills,  when you build a Software Business. As an entrepreneur and a leader in Tech you need to start early developing your personal and especially your communication skills. So we did in 2016! Here’s the list.

How to configure an IT Security Awareness Training with LUCY Interactive Training Templates

Security Awareness Training – Screencast How to customize your own Training using the Mixed Interactive Template

LUCY Relase 3.2 is available in November 2016

Bam! LUCY V3.2 is out with awesome corporate features

Dear LUCY Users,

Phishing Incident Plugin for Outlook and LDAP Integration – Only six weeks after Version 3.1 we’re shipping already LUCY Release V3.2! Why? Because we wanted it so! Big customers and large corporate prospects asked us to provide more corporate features. And we put them in this release!

Analyzing a malware simulation report from LUCY

Malware screencast 5/5 – How malware simulations are reported: Example of a vulnerability scan report.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Screencast showing how a ransomware simulation is run with lucy, this is a tutorial video

Malware screencast 4/5 – Setting up a ransomware attack simulation (harmless) – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Different Malware Types can be simulated with LUCY - Tutorial Screencast

Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Tutorial showing how to execute a malware simulation - This is a LUCY screencast

Malware screencast 2/5 – Executing a malware simulation with LUCY. A harmless vulnerability scan is run.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Set up a malware simulation with LUCY - This screencast tutorial shows how a malware attack simulation is created

Malware screencast 1/5 – Setting Up a Malware Testing Toolkit Simulation – LUCY Server

More than a quarter of Downloads in German Speaking Areas to an Article in German Press in October 2016

The IT Security Community is a Global One – LUCY Software Downloads in October ’16

lucy-phishing-attack-template-efax-cozy-bear

Use Identical Mails as used from Cozy Bear for Your Own Phishing Simulations – Post Election Phishing

Social Engineering and Phishing made easy with LUCY. F.e. the comparison feature is available now in the free edition

Easy social engineering, phishing and more for free! Empowered LUCY Community Edition V 3.1

lucy-download-bad-file-phishing

It Starts with a Phishing Attack: 10 Steps to a Global Financial Meltdown

‘Too big to fail’—But the financial industry remains vulnerable. Just look at the ‘Carbanak attacks’ or the ‘Bangladesh SWIFT Hack’. A global financial meltdown due to hacker attacks is a realistic possibility: A poll taken at Black Hat 2016 indicates that 72% of security experts expect a ‘major issue’ to occur in the next 12 […]

cisco-asr-report-featured-image

5 Takeaways From Cisco’s Big Cybersecurity Report – fortune.com

1-ransomware, 2-flash, 3-abandoned WP-Sites, 4-OldSwitchesRouters, 5-SecTeams are loosing confidence! Jonathan Vanian from fortune.com analyzed Cisco’s annual Security Report. His findings are: Hackers love ransomware (at Hospitals, Universities, UtilityFirms) Adobe Flash is still bad 4 security Abandoned WordPress Sites used by hackers for Shops Companies with old, outdated technology are main targets (Switches, Routers) The badiest […]

setup-phishing-campaign-with-lucy-beginning

Setup Phishing attack – Your first Phishing simulation

Setup a Phishing attack within minutes due template based wizards. If you want to find out how vulnerable your people are to Phishing scams , you should choose LUCY Community Edition (free). Watch the screencast. Setup phishing attack: When you use a best practice template together with the wizard mode, you will have your phishing […]

Installing and configuring the Phishing Server

Screencast Phishing Server installation from scratch – LUCY Security

Install your own Phishing Simulation and Tech Assessment Server within minutes. This short hands-on video shows you how to proceed. Enjoy the screencast Phishing Server installation  from LUCY.  LUCY is very easy to install and to configure. The video shows a complete installation of LUCY Community Edition. The preliminary installation of VMware Open Player and […]

best-incident-responses-beagle

Stories for the Weekend: 4 Best data breach responses in the past years

Here’s a well written blog post from skyhigh networks about the Lockheed Martin Non-Breach (2011), Adobe Breach (2013), Home Depot Breach (2014) and the  Heartland Payment Systems Breach (2008).  The article shows how the companies responded to the cyber attack(s) and what actions they made. The post is not too long and suitable for non-tech persons, […]

PhishingServiceByLUCY

Phishing-Service und Assessementdienstleistungen direkt von LUCY

Interesssenten aus der Schweiz können neu alle Leistungen rund um die Prüfung und Sensibilisierung von Cyber Risiken direkt bei LUCY einkaufen. Der Kunde kann von den Spezialisten lernen und später viele Arbeiten intern erledigen, wenn gewünscht. Technologie Audits, Phishing Simulationen, Prüfungen der Anfälligkeit gegenüber Ransomware, Security Awareness Trainings oder auch Strategieberatung im Bereich Cybersecurity und […]

IMG_0316

Competencies of security leaders

What skills are optimal for a security leader to have? In reviewing a recent study from KPMG, we discovered the following:

lucy-2000-installations

LUCY reached more than 2000 active Installations!

SMISHING-101

LUCY now supports SMiShing attack simulations

LUCY 2.6 has been published with a new feature that allow users to perform SMiShing attack simulations. SMiShing is a security attack in which users are tricked into downloading malware or accessing links from their mobile devices. SMiShing is short for “SMS phishing. LUCY is now the only downloadable application in the world that can […]

lucy-in-the-press

LUCY in the Press

LUCY has received an incredible amount of press coverage in a variety of different publications. Thanks so much! We didn’t expect to receive so much wonderful attention in 2015. http://www.pymnts.com/news/2015/retail-phishing-simulator-hacks-first-educates-later/ http://www.startupticker.ch/en/news/december-2015/schweizer-app-simuliert-hacker-angriffe http://www.itbusiness.ch/news/security/item/858-lucy-2-6-wird-schweizer-taschenmesser-des-cyber-wars.html https://nrf.com/news/let-lucy-do-it https://eforensicsmag.com/lucy/ http://www.informationsecuritybuzz.com/tag/lucy/ http://corporatecomplianceinsights.com/cci_news/lucy-phishing-server-emulates-cyberattacks-to-find-your-organizations-weakest-security-link/ German:  http://www.heise.de/security/artikel/Lucy-Phish-yourself-2548676.html http://www.computerworld.com/article/2950658/data-security/thanks-for-all-the-phish.html http://www.mediasec.ch/de/news/17-02-2015-155958.html http://betanews.com/2015/09/03/the-importance-of-education-in-combating-phishing-attacks-qa/ http://www.nxtbook.com/nxtbooks/nrfe/STORES0915/index.php?startid=62 *Updated JUN-27-2016 to reflect additional press coverage http://news.sys-con.com/node/3649774 https://securitytoday.com/Directory/2016/01/Phishing-Server.aspx http://www.infosecurityproductsguide.com/world/ German: https://www.datenschutz-praxis.de/fachartikel/mit-gefaelschten-e-mails-fuer-den-datenschutz-sensibilisieren/

sas-virus-alert-for-lucy-download

SonicWall blocks the LUCY download as possible malware

SonicWall Gateway Antivirus blocks LUCY download. We have identified an issue with the “Download Files” from our site when the SonicWall Gateway AV application is active. The SonicWall application reports our solution as being a Trojan and will either completely block the download or cause it to fail partway through the downloading process. This is […]

New Video Tutorial “Interactive Sessions with LUCY”

Please watch our latest video tutorial concerning a malware simulation that establishes an interactive client communication with reverse http or https channels.

lucy-explainer-video-vmware-installation1

Setting up LUCY – It takes just minutes!

LUCY comes as VMWare, ESXi, Virtual Box or Amazon AWS images. Professionals can install it as a 64-bit version on Debian / Docker. When you already have a Virtual machine installed on your PC, it takes you just 5 minutes to install Lucy. It’s so easy! In this short video you will learn how to […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Training Video: Educational Video for Users

Rich media content provides the highest learning impact. Use this video in order to improve cybersecurity awareness after you run a phishing simulation in your organization. For even better results, you can create your own video based on LUCY’s approved video by customizing scenes.   This video can be customized to meet your own needs. […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

French Training Video: Educational Video for Users

La vidéo de formation IT Security en français – Le contenu des médias Rich fournit l’impact de l’apprentissage le plus élevé. Utilisez cette vidéo afin d’améliorer la sensibilisation à la cybersécurité après avoir exécuté une simulation phishing dans votre organisation. Pour de meilleurs résultats, vous pouvez baser sur la vidéo approuvée LUCY et personnaliser certaines prises. […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Spanish Training Video: Educational Video for Users

El video de entrenamiento de seguridad de TI en español – Contenido multimedia proporciona el mayor impacto de entrenamiento. Utilizar el vídeo con el fin de mejorar el conocimiento de la ciberseguridad después de ejecutar una simulación de phishing en su organización. Para mejores resultados se puede basar en vídeo aprobado de Lucy y personalizar algunas […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

German Training Video: Educational Video for Users

Das LUCY IT Security Trainingsvideo auf Deutsch – Multimediainhalte bieten den besten Lerneffekt. Verwenden Sie dieses Video zur Festigung der Wachsamkeit in Bezug auf Cybersecurity in Ihrer Organisation, nachdem Sie eine Phishing Simulationskampagne durchgeführt haben. Soll eine noch bessere Trainingswirkung erreicht werden, dann können Sie dieses bewährte Video für Ihre eigenen Bedürfnisse personalisieren lassen.   Passen […]