PhishMe is now Cofense.

On February 27th 2007, while on the phone with my friend and co-founder Rohyt Belani, I typed the name phishme.com into GoDaddy™. We couldn’t believe our good luck and immediately registered it. As the co-founder who named this company PhishMe®,… Continue reading PhishMe is now Cofense.

Identify, Prioritize, and Respond to Phishing Threats Faster with PhishMe and ServiceNow

Improve the Phishing Incident Response Workflow with PhishMe Triage™ and ServiceNow® Security Operations Security leaders are bolstering their resiliency to phishing attacks. It starts with conditioning employees to recognize and report suspicio… Continue reading Identify, Prioritize, and Respond to Phishing Threats Faster with PhishMe and ServiceNow

Viewing Phish with a Payload using PhishMe Intelligence and Maltego

BY MIKE SAURBAUGH AND GEOFF SINGER Visualize Phishing Relationships with PhishMe Intelligence™ and Maltego Fishing (without the “P”) is not a lot of fun when you just drop a line in the water and hope for the best. When fishermen want to see where the fish are, they look to the fish finder on the bridge to “look underwater” to find schools of fish. Similarly, when an analyst is looking to “catch” a phishing campaign, correlating the attacker’s campaigns and their payloads can benefit by being able to visually graph and link phishing threats. PhishMe Intelligence combined with Maltego can…

The post Viewing Phish with a Payload using PhishMe Intelligence and Maltego appeared first on PhishMe.


Viewing Phish with a Payload using PhishMe Intelligence and Maltego was first posted on November 2, 2017 at 11:37 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Viewing Phish with a Payload using PhishMe Intelligence and Maltego

Oh Behave! – Simulation Analysis

When considering your organization’s response to a simulated phish, it is critical to understand that we are emulating / practicing for real life events with the purpose of conditioning appropriate response patterns in our user base.  In other words, when our users come across a real phish, we want them to report it right away. This is what allows us to identify a company’s resilience to specific (active) threats and to enable an anti-phishing programs ability to mitigate phishing risk. On a simulation level, we can analyze the user base’s performance in terms of the actions we are expecting them…

The post Oh Behave! – Simulation Analysis appeared first on PhishMe.


Oh Behave! – Simulation Analysis was first posted on October 30, 2017 at 1:07 pm.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Oh Behave! – Simulation Analysis

PhishMe Named a Consecutive Leader in the 2017 Gartner Magic Quadrant

PhishMe has been named a consecutive leader in Gartner’s 2017 Security Awareness Computer-Based Training Magic Quadrant. It’s the second year we’ve been recognized as a leader and positioned highest in “ability to execute.” “We’re thrilled to be acknowledged as a leader in the Gartner Security Awareness CBT Magic Quadrant for two years in row,” Rohyt Belani, CEO and Co-Founder, PhishMe. “We believe our placement in the leader quadrant validates our commitment to expanding our capabilities and enhancing our solutions to go beyond awareness and to contribute to real defense – stopping attacks at the delivery point.” Aaron Higbee, CTO and…

The post PhishMe Named a Consecutive Leader in the 2017 Gartner Magic Quadrant appeared first on PhishMe.


PhishMe Named a Consecutive Leader in the 2017 Gartner Magic Quadrant was first posted on October 27, 2017 at 10:52 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading PhishMe Named a Consecutive Leader in the 2017 Gartner Magic Quadrant

Social Media: It’s Time to

Part 4 in a weekly blog series, “How Attackers Target Trust,” running during October, National Cyber Security Awareness Month and European Cyber Security Month. Over the past decade, mobile phones and social media have become essential to how we ingest news and communicate friends and families. With the pervasive availability of information and opinions, we now need to do a better job vetting this information ourselves before reacting to it. Our emotional reactions on social media can be used against us. For example, according to Fortune Magazine, scammers have been using Hurricane Harvey-themed messages to trick people into opening phishing…

The post Social Media: It’s Time to appeared first on PhishMe.


Social Media: It’s Time to was first posted on October 24, 2017 at 11:05 am.
©2017 “
PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Social Media: It’s Time to

New Strain of Locky with a “Deadly” Twist

With it being flu season, no one wants to hear that a new strain of the flu has been discovered. Just as network defenders will not be excited that Locky ransomware has evolved yet again. This time however, threat actors decided to add a darker theme to code.   On October 11, 2017, threat actors sent multiple phishing emails with financial themed subjects, although these do not appear to be targeted. Embedded in the body of the message was a .7z archive encoded in base64 containing a malicious VBScript that delivers Locky or Trickbot based on the location of the host. This is not unlike…

The post New Strain of Locky with a “Deadly” Twist appeared first on PhishMe.


New Strain of Locky with a “Deadly” Twist was first posted on October 19, 2017 at 9:27 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading New Strain of Locky with a “Deadly” Twist

Security Awareness: 4 tips on Trusting Technology

Part 3 in a weekly blog series, “How Attackers Target Trust,” running during October, National Cyber Security Awareness Month and European Cyber Security Month. As consumers, we often misplace our faith in technology. We have become so reliant upon it that we take it for granted and assume it’s safe. Availability and convenience, however, do not equal security of use. With the rise in social media (which we will discuss again) and the increasing mobile nature of modern life, we have become accustomed to operating with a false sense of trust in our devices and supporting technologies. Public Wi-Fi? The…

The post Security Awareness: 4 tips on Trusting Technology appeared first on PhishMe.


Security Awareness: 4 tips on Trusting Technology was first posted on October 17, 2017 at 11:43 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Security Awareness: 4 tips on Trusting Technology

To Raise Security Awareness, Don’t Trust the Process.

Part 2 in a weekly blog series, “How Attackers Target Trust,” running during October, National Cyber Security Awareness Month and European Cyber Security Month.  When it comes to trust in the workplace, perhaps our biggest downfall in the security space is trust in business processes. For decades now, we have relied on process definitions to gain efficiencies and to ensure our employees meet expected standards of performance. The question we are now faced with, however, is are those processes secure in and of themselves? The impact technology has had on business is all about efficiency of execution. While this has…

The post To Raise Security Awareness, Don’t Trust the Process. appeared first on PhishMe.


To Raise Security Awareness, Don’t Trust the Process. was first posted on October 12, 2017 at 11:40 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading To Raise Security Awareness, Don’t Trust the Process.