What kinds of phishing attacks does CyberNut train against?
CyberNut exposes users to eight major phishing attack categories, each targeting a different social-engineering tactic or deception technique. Over time, users receive simulations from every category to strengthen overall awareness.
| Attack Type | What It Teaches |
| Business Email Compromise (BEC) | Recognize emails pretending to be from executives or colleagues asking for sensitive actions or payments. |
| Deceptive URL Links | Spot misleading or shortened URLs that redirect to malicious websites. |
| Malicious Attachments | Identify suspicious file attachments that could contain malware. |
| Credential Harvesting | Detect fake sign-in pages designed to steal login information. |
| Tech Support Scams | Recognize fraudulent IT or tech-help emails claiming account issues or security alerts. |
| Reward Scams | Avoid offers of prizes, gift cards, or bonuses used to bait clicks. |
| Brand Impersonation Scams | Distinguish between real and fake communications from trusted brands or vendors. |
| Social Engineering Traps | Learn to question emotionally manipulative messages exploiting urgency, fear, or curiosity. |