News & Blog

Our stories.

User Credential Theft Prevention

Social engineering is the process of attacking the human, or employee, rather than the technology directly. Through social tactics, an employee is tricked into performing an action, such as installing malicious software or performing a transaction.

Ten Steps to Creating a Phishing Awareness Campaign

The following slideshare, authors Christopher Hadnagy and Michele Fincher outline ten steps to creating a phishing awareness campaign for an organization. PhishingBox provides the tools needed to easily implement such a program.

Social Tactics Remain a Significant Threat

Social tactics includes phishing and other related social engineering activities. Basically, social tactics are methods used to penetrate an organization’s cybersecurity defenses by attacking the human.

What is the phishing failure rate by industry?

Employee security awareness should include phishing prevention training. This training should include phishing simulation. However, what is an expected phishing failure rate? The following article outlines phishing failure rates by industry.

Internet Security Threat Report (ISRT) - 2019

The Symantec Internet Security Threat Report (ISRT) for 2019 is continues to provide valuable information for the security professional. This annual security report provides key statistics that outline cybersecurity risks experienced by various orga

Scammers plant links in Google Calendar

Have you received a calendar invite recently and something just did not feel right, Phishing Scammers are now accessing your calendar. Do not accept suspicious invites. Read some tips and find a link to the full article blow.

New Microsoft Graph Feature

We are pleased to announce a new and improved way to Import Groups and Targets using Microsoft. Below are instructions and on how to import using Microsoft Graph API.

New Admin Features & Meet Our New Customer Success Manager

Manage System Emails: You now have the ability to fully customize the look, feel, and content for system generated emails; including branding.System Email Logs: This new section allows users to view a log of all system emails that were...

Reply-to Catchall & Phishing Reported Button

PhishingBox will now catch all replies sent to one of our system domains. We can now tell you if an email bounces, an autoresponder sends a response or the actual target replies to the email.

Updated User Guide - v4.2

Updated User Guide highlighting the new platform features. New Template Library and Template Editor Functionality

EY Global Information Security Survey - 2018

EY is a global leader in in assurance and advisory services. For several decades EY has been conducting a Global Information Security Survey (GISS). The 2018 security survey from EY provides some valuable insight into the cybersecurity threat. Cyb

Symantec Internet Security Threat Report 2018

The Symantec Internet Security Threat Report continues to be a valuable resource for companies to understand current threat vectors. The report highlights current threats and provides specific statistics related to these threats.