Now available in our content library!

Why NINJIO?

 

NINJIO is a premier global cybersecurity awareness & simulated phishing training solution that uses engaging, 3-to-4-minute Hollywood-style microlearning videos to educate and empower individuals and organizations to become defenders against cyber threats. According to Gartner's Peer Insights "Voice of the Customer" report for 2021, NINJIO has been designated as the only "Voice of the Customer" in the computer-based training solutions on the market, out of 42 total vendors covered by Gartner.

  • Location Westlake Village, CA
  • Website www.ninjio.com
  • Founded 2015
  • Content Focus Phishing Awareness, PCI Compliance, Physical Asset Security
Request a Demo

Animated Episodes

NINJIO produces 3 to 4-minute micro-learning episodes that educate your users on the latest threats and breaches. NINJIO releases a new episode every month, which keeps your team up to date.

Real Attacks

Every episode is based on a real company that has suffered a significant breach. NINJIO focus on a single attack vector to not overwhelm your employees with technical terms.

Hollywood Writing

Each episode is written by a member of the Writers Guild of America who has written and produced a combined total of 72 episodes for CSI: NY and Hawaii Five-0.

Training Offers

NINJIO serves some of the largest companies in the world and have changed the behavior of hundreds of thousands of people through engaging, emotionally-driven storytelling.

NINJIO Aware Anime

NINJIO AWARE™ ANIME uses American anime cartoon characters to educate users about cybersecurity awareness. This video format uses NINJIO’s signature Hollywood-style storytelling that shapes the behavior of employees, staff, and team members to raise the security bar in the office and at home.

NINJIO Aware Corporate

NINJIO AWARE™ CORPORATE uses a more conservative style of animation and character sets compared to NINJIO AWARE™ ANIME. No matter the style, each episode is derived from the same topic, script, and voice acting, with the only difference being different character styles.

Content Lineup

 
Episode Title Summary
1 Drive Bye This episode is inspired by the Jeep/Chrysler attack and teaches about USB security.
2 Amber Ashlynn pt1 This episode is inspired by the Ashley Madison attack and teaches about social engineering through Social Media.
3 Amber Ashlynn pt2 This episode is inspired by the Ashley Madison attack and teaches about MS Word document attacks.
4 Sunny Phishing This episode is inspired by the Sony Pictures attack and teaches about spear phishing.
5 Turbine Twist This episode is inspired by the American Super Conductor attack and teaches about password security.
6 Hospital Hijinks This episode is inspired by the Hollywood Presbyterian Medical Center attack and teaches about Ransomware.
7 The W2 Heist This episode is inspired by the Sprouts Farmers Market attack and teaches about W-2 scams.
8 Catfishing This episode is inspired by multiple online dating sites and talks about Cat fishing scams.
9 The Wi-Fi Trap This episode is inspired schemes used to subvert 2FA via SMS. This Episode teaches about 2FA security.
10 The Great Password Breach This episode is inspired by the Anthem breach and teaches about telephone social engineering.
11 Hack the Vote This episode is our first fictional episode and depicted a scenario where voting booths were hacked during the Presidential Election. This teaches about the "Microsoft Support Scam".
12 The Wahoo Waterhole This episode is inspired by the Yahoo! Breach that occurred in September of 2016 and teaches about Watering Hole Attacks.

Last Updated 5/4/2020

Episode Title Summary
1 Cyber Oil Warfare This episode is inspired by the Saudi Aramco hack (the most expensive hack in cyber history) and teaches about badge surfing and a clean desk policy.
2 The Homeless Homebuyer This episode is inspired by the many wire fraud incidents that happen every day. This Episode teaches about using verbal authorization on any transfer of funds.
3 Slippery Side Loading This episode is inspired by the Googlian Attack and teaches about the dangers of side loading mobile apps.
4 IoT Gone Wild This episode in inspired by the DYN DNS attack and teaches about changing your default username and password on IOT Devices.
5 The Ransomware Pyramid Scheme This episode in inspired by the DYN DNS attack and teaches about changing your default username and password on IOT Devices.
6 My Password is Password This episode is based on the McDonalds twitter hack and features bad/reused passwords and talks about passphrases and two-factor authentication.
7 156 Alarms This episode is based on the Dallas Sirens and features spear phishing.
8 ElectroSign of Things to Come This episode is based on the DocuSign hack and covers business email compromise.
9 Pension Plan Telescam This episode is based on caller ID scams and covers telephone spoofing.
10 Beware of the Insider This episode is based on the Google/Uber IP lawsuit and covers malicious insider threats.
11 Juice Jacking This episode is based on the Equifax breach and covers phone charging hacks.
12 Mis-Delivery This episode is based on email misdelivery and covers accidental insider threats and email misdelivery.

Last Updated 5/4/2020

Episode Title Summary
1 Phishing the Stream This episode is inspired by Netflix phishing emails and teaches about phishing and identity theft.
2 Laid Off, Paid Off This episode is inspired by the Uber nondisclosure of a hack. This Episode teaches about securely working from home and VPN security.
3 Chicken or Smish This episode is inspired by text message phishing schemes. This Episode teaches about smishing.
4 2 Factor Fake Out This episode is inspired schemes used to subvert 2FA via SMS. This Episode teaches about 2FA security.
5 The Macro Trojan Takedown This episode is inspired by the Boryspil Airport attack and teaches about macro malware.
6 Ransomware is Everywhere This episode is inspired by the City of Atlanta attack and teaches about ransomware.
7 Update Double Take This episode is inspired by the malicious ad-results and teaches about malvertising.
8 Cryptominer Pants on Fire This episode is inspired by cryptomining and teaches about cryptojacking.
9 Strawberry X Forever This episode is inspired by the US Navy hack and teaches about wireless security.
10 A Terminal Mistake This episode is inspired by the SingHealth breach and teaches about spear phishing.
11 Data Loss by the Logger This episode is inspired by the Zoho hacks and teaches about keystroke loggers.
12 Your Page is My Page This episode is inspired by the Facebook breach and teaches about password security.

Last Updated 5/4/2020

Episode Title Summary
1 You Never Call... This episode is inspired by Cathay Pacific breach and teaches about business email compromise.
2 C'est La Vie, Chamonix This episode is inspired by Marriott breach and teaches about mobile device management.
3 Up, Upvote, and Away This episode is inspired by insider breaches and teaches about data classification.
4 It's Not What You Think... This episode is inspired by blackmail scams and teaches about verifying Email spoofing.
5 Say It, Dont Spray It This episode is inspired by the Citrix breach and teaches about password spraying.
6 Vacation Devastation This episode is inspired by the Airbnb scams and teaches about social media security.
7 Blame Game This episode is inspired by the Binance hack and teaches about malicious insider threats.
8 SMS SOS This episode is inspired by The Community hacking ring and teaches about SIM card hijacking.
9 USB Nation This episode is inspired by infrastructure breaches and teaches about USB drops.
10 Voicemail Fail This episode is inspired by Capital One breach and teaches about spear phishing detection.
11 Disregard the Gift Card This episode is inspired by gift card scams and teaches about gift card fraud.
12 Plug and Pay This episode is inspired by the Pitney Bowes hack and teaches about Ransomware.

Last Updated 5/4/2020

Episode Title Summary
1 Hook, Line, and Spoofer This episode is inspired by telephone scams and teaches about identifying telephone spoofing.
2 Passphrase For Days This episode is inspired by the most recent Macys breach and teaches about passphrases.
3 A Compromising Crash This episode is inspired by the London Stock Exchange and teaches about business email compromise.
4 Lets Get Physical This episode features famous actor and comedian, Jon Lovitz, and teaches about physical security.
5 Scams Gone Viral This episode is inspired by COVID-19 related scams and teaches about email attachment threats.
6 Charity Case This episode is inspired by money mule scams and teaches how to avoid charity-based scams.
7 House of Fraud This episode is inspired by home title fraud scams and teaches about website spoofing.
8 401 Chaos This episode is inspired by 401K scams and teaches about 401K Scams.
9 Death Smish This episode is inspired by the Blueleaks hack and teaches about Smishing.
10 GPS Distress This episode is inspired by chatbot hacks and teaches about Man-in-the-middle Attacks.
11 Homephished This episode is inspired by the Suprema data breach and teaches about Social Media Spear Phishing.
12 Lock Before You Walk This episode is inspired by corporate device hacks and teaches about Home VPN Security.

Last Updated 5/4/2020

Episode Title Summary
1 WIRE TRIPPIN' This episode is inspired by the "Sport Clips" security breach and teaches about how to identify Wire Fraud.
2 Dangerous Communiqu This episode is inspired by Macro-based attacks.
3 Louie Louie This episode is inspired by Privacy & PII.
4 DON'T FALL FOR IT This episode is inspired by Web Browser Push Notifications.
5 THAT'S A WRAP This episode is inspired by Social Engineering job post scams.

Last Updated 5/4/2020

Sample Training Pages

Frequently Asked Questions

 

Yes. PhishingBox has standard integrations with several platforms. Click here to learn our integrations. In addition, we have an application programing interface (API) that can be used for custom applications. Click here to learn more about our API.

Security Awareness Training & Threat Prevention

Use our suite of security tools for a robust security awareness training and threat prevention program.