Empower your users in the fight against malware: Register for our Webinar on June-29th!

Buy a Mock Phish or an IT-Sec Awareness Training for just 1800 Dollars!

Buy educational Phishing campaigns or IT-Awareness trainings for yourself or your clients directly from LUCY!  Define your requirements and we will set up a service based on one of our existing LUCY attack / training templates. We will set up and prepare a mock phish campaign or an awareness training based on your requirements and […]

Kereon is a LUCY Partner

Kereon is now a certified LUCY Ecosystem Partner

The Canadian Training and Cybersecurity Specialist Kereon has become a LUCY Value Added Reseller! Kereon is empowering their world-class training and Cybersecurity expertise to its worldwide customers with the LUCY Antiphishing Server. To face the ever growing Information Security challenges the company has developed a Security Awareness program called Awee® based on a multidisciplinary team […]

LUCY Email Risk Score - Visualization how risky emails are

The automated LUCY E-Mail Risk Score

Simplified detection of dangerous emails and massive relief of the security team. The LUCY Email Risk Score as the defining feature of the Threat Analyzer module. The “Cisco 2017 Annual Cybersecurity Report“, makes it clear: “…In many cases, their security teams can investigate only half the security alerts they receive on a given day.” This is where […]

Neoteric is a LUCY Security Partner in Great Britain

Neoteric Networks UK is a certified LUCY Ecosystem Partner

We are delighted that Neoteric Networks UK has become a LUCY Value Added Reseller! Cybersecurity is taken very seriously in the United Kingdom. This leads to a high quality standard throughout the market and to a great interest for our LUCY Server. In the short time since the end of the partnership agreement, Neoteric Networks […]

The Google Docs Phishing Scam as Mock Phish Scenario

The Google Docs Phishing Attack was highly efficient in the wild. LUCY delivers a Mock Phish scenario based on this attack. The scenario has functions that are not possible with competing products. The Google Docs Phishing scam in May 2017 was a really efficient one. The google docs phish affected 0.1% of the gmail users. So […]

LUCY Server Overview Two Pager

LUCY Two Pager 2017

All you need to know about LUCY Server on one sheet of paper. The Two Pager Overview for LUCY V 3.4.     The functionality of the Cyber Prevention and Training Server is displayed on a single page using a simple feature list. Explore the full functionality of LUCY Server in a compressed form.    

Lucy 3.5 is out

Meet new Lucy 3.5! This version covers mainly internal updates not really visible to the user. Nevertheless we strongly recommend to update immediately to Version 3.5 because of the improved security. You can download VMware ESXi, VMware Workstation, VirtualBox images and Linux installer script on Lucy website, or use a pre-configured AMI on Amazon EC2 […]

LUCY Security and Palo Stacho Handelszeitung

Hot topic WannaCry: Significant response to LUCY in the Swiss business and Sunday press

Zürich-Thalwil, 20. Mai 2017 – The global WannaCry attack has put the issue of ransomware and malware countermeasures in the public focus. LUCY is now acknowledged in the leading media of the Swiss press as one of the pillars in the fight against cycled crime! The economic crime now takes place in Cyberspace. This has […]

Results from the Customer Survey 2017

Key findings: 84% of the participants recommend LUCY Security and two-thirds of the respondents are willing to call themselves publicly as a reference customer! And more than 70% of the participants are interested in a user group. For us, it is also interesting that almost half of the submitted suggestions for improvement are already available […]

Phishing Incident Plugin for Outlook - LUCY Server

Our Phishing Incident Button is now available Everywhere!

LUCY Phishing Incident Plugin allows an easy and fast response to ongoing threats. Because it’s a highly beneficial feature for companies of all sizes we decided to make it available to ALL commercial editions of LUCY. Already for 350$ / Year you get an unlimited alert feature for your company! Phishing Incident Plugin for MS-Outlook available […]

The new version 3.4 is available and thus also a world novelty

We launched LUCY V 3.4: Cyber prevention as well as IT health checks affordable for everyone and the world-wide new integrated threat analysis of incoming e-mails using the LUCY Risk Score are the highlights of the current release. Threat Analyser and Risk Score The “Cisco 2017 Annual Cybersecurity Report“, which is highly regarded in the […]

Create and run a smishing attack in two minutes - LUCY screencast

Setup and Run a Smishing Attack in 2 Minutes – Educational Social Engineering with LUCY

A smishing attack is done easily with LUCY Server. Set up your educational social engineering campaigns and train your people. Create and Run a Smishing Attack Simulations with LUCY Server. A Smishing Campaign is like a Phishing Campaign, but the distribution is done over SMS messages instead using email. With LUCY you can set up […]

Ransomware Explainer Video by LUCY

Did you know that you can customize our Ransomware Explainer Video?

Adapt LUCY’s Ransomware Explainer Video to your own needs. Owners of a commercial edition can customize every educational video delivered by LUCY for a reasonable price. Our Ransomware video explains in less than two minutes how to protect against Ransomware attacks. This is about the behaviour of each individual: do not open links from unknown, […]

Educational Advanced Spear Phishing Simulation with the appropriate Malware

Advanced Spear Phishing Campaign and appropriate Malware [Video-Tutorial]

Suitable for reproduction: Build your own advanced Spear Phishing Simulation with the appropriate attached Malware with LUCY. A 30 minute video gives you the possibility to build up an advanced phishing and malware simulation almost off the cuff! LUCY Founder Oliver explains how you can set up an advanced Educational Spear Phishing campaign and store it […]

What the public knows about cybersecurity quiz

Most Americans don’t know much about Cybersecurity – And you?

I did the quiz. My score was 9 out of 10. With this result I belong to the top 4% – It’s not only about strong passwords… A new Pew Research Center survey titled “What the Public Knows about Cybersecurity” tallied responses from more than thousand American adults last year about their understanding of concepts […]

Update immediately to LUCY V 3.3.3

Alert! Please install V 3.3.3! Your LUCY Server needs an immediate patch.

Dear Clients, Please install LUCY version 3.3.3 as soon as possible! It should be available in Lucy upgrade section.   In the case the server has running campaigns: If you have some campaigns running, that prevent you from upgrading and you are unable to access the campaign page, you will be unable to upgrade from […]

Cyber Insecurity: Administrations are not giving enough priority to the issue of cybersecurity and cybercrime today (2017), ie the wrong attitude.

The Best Remedy for Cyber Insecurity

The Ransomware explosion of 2016 has not only led to lot of  damage, but also to uncertainty and “cyber insecurity”. This is normal; in the case of new incidents, every person is initially unsure. As with all other uncertainties, experience, education, attitudes and practice also help with cyber insecurity! Experience – In the case of […]

Biggest Cyber Security Threat 2017

What is the Biggest Cyber Security Threat this Year?

When Artficial Intelligence becomes Criminal or your Fingerprint gets Hacked and eighty other Nightmares in (cyber)crime. In his blog post “Cyber Security Threat 2017” Deepak Kumar has published the answers of his survey on possible cyberspace threats. Nearly 90 answers read like a template for Mr. Robot’s next season. Here are a few examples: 1984 […]

Register for LUCYs Spear Phishing and Malware Setup Webinar on April 11th 2017

Register for our Spear Phishing and Malware Webinar on April-11th!

The current phishing attacks are now becoming more sophisticated and personal. Our experience has shown that the employees of an organization, with appropriate training and phishing simulations can better deal with such threats and this can significantly increase the company’s security. Join our webinar and experience live how to set up, implement and evaluate a personalized […]

The ultimate Phishing Tool and even more – LUCY V 3.3 out now!

A completely redeveloped PhishButton, Reports in Microsoft Word format, improved learning management system (LMS) functionalities: LUCY had become the ultimate Phishing Tool (and even more)! And it’s still free for up to 50 Users! Download it now. New Version: The Phishing Tool and its training functionalities Again, we put lot of efforts into our baby. […]

Robert Bosch uses LUCY for Phishing Simulations

Customer Story – Experiences with the use of the LUCY Phishing Awareness Training Server at Robert Bosch

An interview with Patrick Zeller, Senior Manager Enterprise Security, Robert Bosch LLC. March 2017 – “Bosch” is one of LUCY Security’s first major customers. Thanks to its support, the LUCY Phishing and Awareness Training Server was able to develop rapidly. At the beginning of the year 2017, we interviewed Mr. Zeller on the use and […]

You want to copy an existing Website for a Social Engineering Scam? (Simulation) – We show you how it’s done

After 2 (two!) minutes you have a cloned website for your Phishing Scenario. LUCY Social Engineering Simulation Server empowers you when you set up an IT-Security Awareness Campaign [Screencast]. Advanced Phishing Simulations: Clone a Website and add your own Login Form – Do you want to create a phishing simulation and you want to use […]

Phishing Reports: How to read and analyze Stats of a Ransomware Simulation or a File based Phishing Attack

How do you read the results of a Phishing Campaign containing an file attachment or even of a Ransomware Simulation? A hands-on example explains how to get campaign insights and how to read LUCY Phishing Reports. The initial situation and the question You prepared a file based phishing scenario. The attachement is a word file […]

LUCY is Winner of the Cyber Security Excellence Awards 2017 - Category Awareness Platform

Yes! – LUCY won it’s Second Award!

Big Update: Awareness Training and Phishing Attack Templates 02/2017 – IT Security Training reloaded!

LUCY made it to the finals of the 2017 Cybersecurity Excellence Awards!

LUCY made it! We are finalists for both awards!

Phishing Awareness Content Templates for LUCY Server 01/2017

Phishing Awareness and Attack Scenario Update 01/2017 – Lot of new or improved content!

Books from Verne Harnish, Stephen Covey, Eric Ries, Liz Wiseman, Marshal Rosenberg and Christoph Mathis for building a better business: Lean Startup, Non Violent Communication, Scaled Agile, Scaling Up and Multipliers

For Accelerators, Multipliers and Entrepreneurs – The Books we read in 2016

It is important that you don’t only focus on Tech skills,  when you build a Software Business. As an entrepreneur and a leader in Tech you need to start early developing your personal and especially your communication skills. So we did in 2016! Here’s the list.

How to configure an IT Security Awareness Training with LUCY Interactive Training Templates

Security Awareness Training – Screencast How to customize your own Training using the Mixed Interactive Template

LUCY Relase 3.2 is available in November 2016

Bam! LUCY V3.2 is out with awesome corporate features

Dear LUCY Users,

Phishing Incident Plugin for Outlook and LDAP Integration – Only six weeks after Version 3.1 we’re shipping already LUCY Release V3.2! Why? Because we wanted it so! Big customers and large corporate prospects asked us to provide more corporate features. And we put them in this release!

Analyzing a malware simulation report from LUCY

Malware screencast 5/5 – How malware simulations are reported: Example of a vulnerability scan report.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Screencast showing how a ransomware simulation is run with lucy, this is a tutorial video

Malware screencast 4/5 – Setting up a ransomware attack simulation (harmless) – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Different Malware Types can be simulated with LUCY - Tutorial Screencast

Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Tutorial showing how to execute a malware simulation - This is a LUCY screencast

Malware screencast 2/5 – Executing a malware simulation with LUCY. A harmless vulnerability scan is run.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Set up a malware simulation with LUCY - This screencast tutorial shows how a malware attack simulation is created

Malware screencast 1/5 – Setting Up a Malware Testing Toolkit Simulation – LUCY Server

Use Identical Mails as used from Cozy Bear for Your Own Phishing Simulations – Post Election Phishing

Social Engineering and Phishing made easy with LUCY. F.e. the comparison feature is available now in the free edition

Easy social engineering, phishing and more for free! Empowered LUCY Community Edition V 3.1

It Starts with a Phishing Attack: 10 Steps to a Global Financial Meltdown

‘Too big to fail’—But the financial industry remains vulnerable. Just look at the ‘Carbanak attacks’ or the ‘Bangladesh SWIFT Hack’. A global financial meltdown due to hacker attacks is a realistic possibility: A poll taken at Black Hat 2016 indicates that 72% of security experts expect a ‘major issue’ to occur in the next 12 […]

5 Takeaways From Cisco’s Big Cybersecurity Report – fortune.com

1-ransomware, 2-flash, 3-abandoned WP-Sites, 4-OldSwitchesRouters, 5-SecTeams are loosing confidence! Jonathan Vanian from fortune.com analyzed Cisco’s annual Security Report. His findings are: Hackers love ransomware (at Hospitals, Universities, UtilityFirms) Adobe Flash is still bad 4 security Abandoned WordPress Sites used by hackers for Shops Companies with old, outdated technology are main targets (Switches, Routers) The badiest […]

Setup Phishing attack – Your first Phishing simulation

Setup a Phishing attack within minutes due template based wizards. If you want to find out how vulnerable your people are to Phishing scams , you should choose LUCY Community Edition (free). Watch the screencast. Setup phishing attack: When you use a best practice template together with the wizard mode, you will have your phishing […]

Installing and configuring the Phishing Server

Screencast Phishing Server installation from scratch – LUCY Security

Install your own Phishing Simulation and Tech Assessment Server within minutes. This short hands-on video shows you how to proceed. Enjoy the screencast Phishing Server installation  from LUCY.  LUCY is very easy to install and to configure. The video shows a complete installation of LUCY Community Edition. The preliminary installation of VMware Open Player and […]

Stories for the Weekend: 4 Best data breach responses in the past years

Here’s a well written blog post from skyhigh networks about the Lockheed Martin Non-Breach (2011), Adobe Breach (2013), Home Depot Breach (2014) and the  Heartland Payment Systems Breach (2008).  The article shows how the companies responded to the cyber attack(s) and what actions they made. The post is not too long and suitable for non-tech persons, […]

LUCY Functional Overview

Phishing-Service und Assessementdienstleistungen direkt von LUCY

Interesssenten aus der Schweiz können neu alle Leistungen rund um die Prüfung und Sensibilisierung von Cyber Risiken direkt bei LUCY einkaufen. Der Kunde kann von den Spezialisten lernen und später viele Arbeiten intern erledigen, wenn gewünscht. Technologie Audits, Phishing Simulationen, Prüfungen der Anfälligkeit gegenüber Ransomware, Security Awareness Trainings oder auch Strategieberatung im Bereich Cybersecurity und […]

Competencies of security leaders

What skills are optimal for a security leader to have? In reviewing a recent study from KPMG, we discovered the following:

LUCY reached more than 2000 active Installations!

LUCY now supports SMiShing attack simulations

LUCY 2.6 has been published with a new feature that allow users to perform SMiShing attack simulations. SMiShing is a security attack in which users are tricked into downloading malware or accessing links from their mobile devices. SMiShing is short for “SMS phishing. LUCY is now the only downloadable application in the world that can […]

LUCY in the Press last year

LUCY has received an incredible amount of press coverage in a variety of different publications. Thanks so much! We didn’t expect to receive so much wonderful attention in 2015. Here are the links to the publications covering LUCY Server: http://www.pymnts.com/news/2015/retail-phishing-simulator-hacks-first-educates-later/ http://www.startupticker.ch/en/news/december-2015/schweizer-app-simuliert-hacker-angriffe http://www.itbusiness.ch/news/security/item/858-lucy-2-6-wird-schweizer-taschenmesser-des-cyber-wars.html https://nrf.com/news/let-lucy-do-it https://eforensicsmag.com/lucy/ http://www.informationsecuritybuzz.com/tag/lucy/ http://corporatecomplianceinsights.com/cci_news/lucy-phishing-server-emulates-cyberattacks-to-find-your-organizations-weakest-security-link/ German:  http://www.heise.de/security/artikel/Lucy-Phish-yourself-2548676.html http://www.computerworld.com/article/2950658/data-security/thanks-for-all-the-phish.html http://www.mediasec.ch/de/news/17-02-2015-155958.html http://betanews.com/2015/09/03/the-importance-of-education-in-combating-phishing-attacks-qa/ http://www.nxtbook.com/nxtbooks/nrfe/STORES0915/index.php?startid=62 *Updated JUN-27-2016 to […]

SonicWall blocks the LUCY download as possible malware

SonicWall Gateway Antivirus blocks LUCY download. We have identified an issue with the “Download Files” from our site when the SonicWall Gateway AV application is active. The SonicWall application reports our solution as being a Trojan and will either completely block the download or cause it to fail partway through the downloading process. This is […]

New Video Tutorial “Interactive Sessions with LUCY”

Please watch our latest video tutorial concerning a malware simulation that establishes an interactive client communication with reverse http or https channels.

Setting up LUCY – It takes just minutes!

LUCY comes as VMWare, ESXi, Virtual Box or Amazon AWS images. Professionals can install it as a 64-bit version on Debian / Docker. When you already have a Virtual machine installed on your PC, it takes you just 5 minutes to install Lucy. It’s so easy! In this short video you will learn how to […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Training Video: Educational Video for Users

Rich media content provides the highest learning impact. Use this video in order to improve cybersecurity awareness after you run a phishing simulation in your organization. For even better results, you can create your own video based on LUCY’s approved video by customizing scenes.   This video can be customized to meet your own needs. […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

French Training Video: Educational Video for Users

La vidéo de formation IT Security en français – Le contenu des médias Rich fournit l’impact de l’apprentissage le plus élevé. Utilisez cette vidéo afin d’améliorer la sensibilisation à la cybersécurité après avoir exécuté une simulation phishing dans votre organisation. Pour de meilleurs résultats, vous pouvez baser sur la vidéo approuvée LUCY et personnaliser certaines prises. […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Spanish Training Video: Educational Video for Users

El video de entrenamiento de seguridad de TI en español – Contenido multimedia proporciona el mayor impacto de entrenamiento. Utilizar el vídeo con el fin de mejorar el conocimiento de la ciberseguridad después de ejecutar una simulación de phishing en su organización. Para mejores resultados se puede basar en vídeo aprobado de Lucy y personalizar algunas […]

The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

German Training Video: Educational Video for Users

Das LUCY IT Security Trainingsvideo auf Deutsch – Multimediainhalte bieten den besten Lerneffekt. Verwenden Sie dieses Video zur Festigung der Wachsamkeit in Bezug auf Cybersecurity in Ihrer Organisation, nachdem Sie eine Phishing Simulationskampagne durchgeführt haben. Soll eine noch bessere Trainingswirkung erreicht werden, dann können Sie dieses bewährte Video für Ihre eigenen Bedürfnisse personalisieren lassen.   Passen […]