Resources

Enjoy our resources, articles, whitepapers, business documents and infographics.

Ransomware Explainer Video by LUCY

Did you know that you can customize our Ransomware Explainer Video?

/
Adapt LUCY's Ransomware Explainer Video to your own needs. Owners…
Use your own website for phishing scams
,

Next Webinar: Using your own Website for a Phishing Simulation

Wow! In our eyes, our first webinar was an overwhelming success!…
Educational Advanced Spear Phishing Simulation with the appropriate Malware
, ,

Advanced Spear Phishing Campaign and appropriate Malware [Video-Tutorial]

/
Suitable for reproduction: Build your own advanced Spear Phishing…
Robert Bosch uses LUCY for Phishing Simulations
, ,

Customer Story - Experiences with the use of the LUCY Phishing Awareness Training Server at Robert Bosch

An interview with Patrick Zeller, Senior Manager Enterprise Security,…
copy-existing-webpage-for-social-engineering-scam-simulation-with-lucy
,

You want to copy an existing Website for a Social Engineering Scam? (Simulation) - We show you how it's done

/
After 2 (two!) minutes you have a cloned website for your Phishing…
download-stats-of-a-phishing-cammpaign-with-file-but-no-sucess-lucy-antiphishing-server
Avoid Ransomware - Locky in Action
How to configure an IT Security Awareness Training with LUCY Interactive Training Templates
Use Malware and Ransomware simulations from LUCY: Screencasts, examples and tutorials
150 most influencial blogs and contributors in information security - Cyber Security Ranking
lucy-download-bad-file-phishing
,

It Starts with a Phishing Attack: 10 Steps to a Global Financial Meltdown

/
'Too big to fail'—But the financial industry remains vulnerable.…
LUCY-Header-Functional-overview
PhishingServiceByLUCY

Phishing-Service und Assessementdienstleistungen direkt von LUCY

/
Interesssenten aus der Schweiz können neu alle Leistungen rund…
create-phishing-file-campaign-video
IMG_0316

Competencies of security leaders

/
What skills are optimal for a security leader to have? In reviewing…
lucy-introduction-video1
lucy-pentest-kit-interactive-session2
lucy-in-the-press
, ,

LUCY in the Press

/
LUCY has received an incredible amount of press coverage in a…
hacken_fuer_dummies
lucy-explainer-video-vmware-installation1
,

Setting up LUCY - It takes just minutes!

/
LUCY comes as VMWare, ESXi, Virtual Box or Amazon AWS images.…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server
,

Training Video: Educational Video for Users

/
Rich media content provides the highest learning impact. Use…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server
,

French Training Video: Educational Video for Users

/
La vidéo de formation IT Security en français - Le contenu…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server
,

Spanish Training Video: Educational Video for Users

/
El video de entrenamiento de seguridad de TI en español - Contenido…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server
,

German Training Video: Educational Video for Users

/
Das LUCY IT Security Trainingsvideo auf Deutsch - Multimediainhalte…