CyberProtex
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
Picture

Phishing Simulations

Picture

​We offer Phishing Simulations

Phishing is a generic term for email attacks that try to steal sensitive information in messages that appear to be from legitimate or trusted senders. Phishing is a part of a subset of techniques we classify as social engineering.
Picture

CyberProtex customizes phishing simulation attacks using Social engineering techniques

Picture
We work with companies to customize phishing simulation attacks. Customers select an available social engineering technique, which was curated from the MITRE ATT&CK® framework, our software prepares different payloads available for different techniques. 
https://attack.mitre.org/techniques/enterprise/
Picture

Payloads Creation using WYSIWYG

Picture
A payload is the phishing email message and links or attachment content that's are presented to users in simulations. CyberProtex's Attack simulations offers a robust built-in payload catalog for the available social engineering techniques. We work with customers to create custom payloads that will work better for your organization.

​The following details are shown for each payload:

Payload name
Language: The language of the payload content. Microsoft's payload catalog (global) provides payloads in 10+ languages which can also be filtered.
Click rate: How many people have clicked on this payload.
Predicted compromise rate: Historical data for the payload across Microsoft 365 that predicts the percentage of people who will get compromised by this payload.


Scheduler - Attack Simulator

Picture
Picture
We offer the following social engineering techniques using our custom scheduler:

Credential harvest: Attempts to collect credentials by taking users to a well-known looking website with input boxes to submit a username and password.

Malware attachment: Adds a malicious attachment to a message. When the user opens the attachment, arbitrary code is run that will help the attacker compromise the target's device.

Link in attachment: A type of credential harvest hybrid. An attacker inserts a URL into an email attachment. The URL within the attachment follows the same technique as credential harvest.

Link to malware: Runs some arbitrary code from a file hosted on a well-known file sharing service. The message sent to the user will contain a link to this malicious file. Opening the file will help the attacker compromise the target's device.

Drive-by URL: The malicious URL in the message takes the user to a familiar-looking website that silently runs and/or installs code on the user's device.
​JOIN OUR EMAIL LIST
contact us
Picture

Contact Us Today
256-401-7072

For more information about Cyber Security from trusted sources check out:
  • https://www.nist.gov/cyberframework
  • https://dhs.gov/topic/cybersecurity
For more information about cyber-bullying for teens and parents check out:
  • CyberProtex Community Outreach page
Picture
CyberProtex, LLC - 2012-2023
ContactUs@CyberProtex.com
256-401-7072
Picture
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact