Skip to content
English
  • There are no suggestions because the search field is empty.

What kinds of phishing attacks does CyberNut train against?

CyberNut exposes users to eight major phishing attack categories, each targeting a different social-engineering tactic or deception technique. Over time, users receive simulations from every category to strengthen overall awareness.

Attack Type What It Teaches
Business Email Compromise (BEC) Recognize emails pretending to be from executives or colleagues asking for sensitive actions or payments.
Deceptive URL Links Spot misleading or shortened URLs that redirect to malicious websites.
Malicious Attachments Identify suspicious file attachments that could contain malware.
Credential Harvesting Detect fake sign-in pages designed to steal login information.
Tech Support Scams Recognize fraudulent IT or tech-help emails claiming account issues or security alerts.
Reward Scams Avoid offers of prizes, gift cards, or bonuses used to bait clicks.
Brand Impersonation Scams Distinguish between real and fake communications from trusted brands or vendors.
Social Engineering Traps Learn to question emotionally manipulative messages exploiting urgency, fear, or curiosity.