Phishy

Phishy company information, Employees & Contact Information

Explore related pages

Related company profiles:

Phishy offers a comprehensive platform focused on reducing human risk in cybersecurity, transforming vulnerabilities into strengths: • Simulations (Phishing, Vishing, Smishing): Real-world cyberattack simulations. Phishing targets email, vishing involves phone scams, and smishing focuses on fraudulent SMS messages. These exercises train your team to recognize and effectively respond to various forms of social engineering. • Short and Engaging Training Content: Gamified and interactive training modules that embed cybersecurity practices into daily routines. • Incident Response: Quickly identify and report suspicious emails to enhance security and reduce risk. • PhishyPot (Honeypot Module): Deploys decoy email accounts that mimic real employee emails to lure and catch cyber attackers, detecting threats early. These modules strengthen your organization’s defenses by addressing the critical human factor in cybersecurity.
Looking for a particular Phishy employee's phone or email?

Phishy Questions

News

From Compromised Keys to Phishing Campaigns: Inside a Cloud Email Service Takeover - wiz.io

From Compromised Keys to Phishing Campaigns: Inside a Cloud Email Service Takeover wiz.io

Phishing campaign targets Rust developers - Help Net Security

Phishing campaign targets Rust developers Help Net Security

Rust Developers Targeted in Phishing Scam on Crates.io for GitHub Credentials - WebProNews

Rust Developers Targeted in Phishing Scam on Crates.io for GitHub Credentials WebProNews

Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints - Morphisec

Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints Morphisec

Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks - SOCRadar® Cyber Intelligence Inc.

Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks SOCRadar® Cyber Intelligence Inc.

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang - Krebs on Security

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang Krebs on Security

AI-Generated Phishing Report Pulls Indie Game Site Itch.io Offline - PCMag

AI-Generated Phishing Report Pulls Indie Game Site Itch.io Offline PCMag

Trezor’s support platform abused in crypto theft phishing attacks - BleepingComputer

Trezor’s support platform abused in crypto theft phishing attacks BleepingComputer

itch.io blames Funko for taking down its website due to phishing report created by some “trash AI-powered” software - Game World Observer

itch.io blames Funko for taking down its website due to phishing report created by some “trash AI-powered” software Game World Observer

Itch.io platform briefly goes down due to “AI-driven” anti-phishing report - Ars Technica

Itch.io platform briefly goes down due to “AI-driven” anti-phishing report Ars Technica

Itch.io is currently offline due to a “trash AI-powered” phishing report - The Verge

Itch.io is currently offline due to a “trash AI-powered” phishing report The Verge

New Phishing Attack Targeting Amazon Prime Users To Steal Login Credentials - CybersecurityNews

New Phishing Attack Targeting Amazon Prime Users To Steal Login Credentials CybersecurityNews

Itch.io Taken Offline for Several Hours Over "Bogus" Funko Phishing Claim - TechRaptor

Itch.io Taken Offline for Several Hours Over "Bogus" Funko Phishing Claim TechRaptor

Indie Game Platform Itch.io Says Its Domain Was Nuked Due to 'Trash AI-Powered' Phishing Report - Gizmodo

Indie Game Platform Itch.io Says Its Domain Was Nuked Due to 'Trash AI-Powered' Phishing Report Gizmodo

Itch.io falls prey to 'trash AI' as 'bogus' phishing claim darkens site for hours - Android Police

Itch.io falls prey to 'trash AI' as 'bogus' phishing claim darkens site for hours Android Police

Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber Deception - SOCRadar® Cyber Intelligence Inc.

Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber Deception SOCRadar® Cyber Intelligence Inc.

Funko and BrandShield Deny Causing Itch.io Phishing Claim Shutdown - TechRaptor

Funko and BrandShield Deny Causing Itch.io Phishing Claim Shutdown TechRaptor

Tycoon 2FA: An Evolving Phishing Kit Powering PhaaS Threats - SOCRadar® Cyber Intelligence Inc.

Tycoon 2FA: An Evolving Phishing Kit Powering PhaaS Threats SOCRadar® Cyber Intelligence Inc.

The Blogspot Based Phishing Attacks - SOCRadar® Cyber Intelligence Inc.

The Blogspot Based Phishing Attacks SOCRadar® Cyber Intelligence Inc.

Phishing Attack Compromises Cyberhaven’s Chrome Extension, Impacts Thousands – What You Need to Know - SOCRadar® Cyber Intelligence Inc.

Phishing Attack Compromises Cyberhaven’s Chrome Extension, Impacts Thousands – What You Need to Know SOCRadar® Cyber Intelligence Inc.

Indie games site Itch.io temporarily taken down by Funko, due to 'AI-powered' brand protection company that 'created some bogus phishing report' - PC Gamer

Indie games site Itch.io temporarily taken down by Funko, due to 'AI-powered' brand protection company that 'created some bogus phishing report' PC Gamer

Itch.io Blames Funko And Trash AI Phishing Report For Going Offline - HotHardware

Itch.io Blames Funko And Trash AI Phishing Report For Going Offline HotHardware

Emerging phishing campaign targeting AWS accounts - wiz.io

Emerging phishing campaign targeting AWS accounts wiz.io

Top 10 Trends in Phishing Attacks (2024) - SOCRadar® Cyber Intelligence Inc.

Top 10 Trends in Phishing Attacks (2024) SOCRadar® Cyber Intelligence Inc.

Threat actors leverage tax season to deploy tax-themed phishing campaigns - Microsoft

Threat actors leverage tax season to deploy tax-themed phishing campaigns Microsoft

Phishing and Social Engineering: The Human Factor in Election Security - GreyNoise

Phishing and Social Engineering: The Human Factor in Election Security GreyNoise

Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model - Nature

Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model Nature

Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods - SOCRadar® Cyber Intelligence Inc.

Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods SOCRadar® Cyber Intelligence Inc.

Toll of Deception: Where Evasion Drives Phishing Forward - Group-IB

Toll of Deception: Where Evasion Drives Phishing Forward Group-IB

ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution - EclecticIQ Blog

ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution EclecticIQ Blog

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream - Sophos News

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream Sophos News

Check Point Research Unveils Q3 2024 Brand Phishing Trends: Microsoft Remains Most Imitated Brand as Aliba ... - Check Point Blog

Check Point Research Unveils Q3 2024 Brand Phishing Trends: Microsoft Remains Most Imitated Brand as Aliba ... Check Point Blog

Top 10 Phishing Simulation Tools - SOCRadar® Cyber Intelligence Inc.

Top 10 Phishing Simulation Tools SOCRadar® Cyber Intelligence Inc.

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing - The Hacker News

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing The Hacker News

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials - The Hacker News

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials The Hacker News

We wanted to craft a perfect phishing scam. AI bots were happy to help - Reuters

We wanted to craft a perfect phishing scam. AI bots were happy to help Reuters

From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine - The Hacker News

From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine The Hacker News

A Day in the Life of a Prolific Voice Phishing Crew - Krebs on Security

A Day in the Life of a Prolific Voice Phishing Crew Krebs on Security

APT28 aka UAC-0001 Group Leverages Phishing Emails Disguised As Instructions for OS Updates Targeting Ukrainian State Bodies - SOC Prime

APT28 aka UAC-0001 Group Leverages Phishing Emails Disguised As Instructions for OS Updates Targeting Ukrainian State Bodies SOC Prime

Fake DocuSign email hides tricky phishing attempt - Malwarebytes

Fake DocuSign email hides tricky phishing attempt Malwarebytes

Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You're Fired’ Campaign - SOCRadar® Cyber Intelligence Inc.

Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You're Fired’ Campaign SOCRadar® Cyber Intelligence Inc.

Use of IPFS in mass and targeted phishing campaigns - Securelist

Use of IPFS in mass and targeted phishing campaigns Securelist

EvilProxy Phishing-as-a-Service with MFA Bypass Emerged in Dark Web - Resecurity

EvilProxy Phishing-as-a-Service with MFA Bypass Emerged in Dark Web Resecurity

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices - The Hacker News

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices The Hacker News

Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack - Unit 42

Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack Unit 42

Itch.io falls prey to 'trash AI' as 'bogus' phishing claim darkens site for hours - Yahoo

Itch.io falls prey to 'trash AI' as 'bogus' phishing claim darkens site for hours Yahoo

An update on the threat landscape - blog.google

An update on the threat landscape blog.google

QR Phishing Leads to Microsoft 365 Account Compromise - Secureworks

QR Phishing Leads to Microsoft 365 Account Compromise Secureworks

Not pretty, not Windows-only: npm phishing attack laces popular packages with malware - theregister.com

Not pretty, not Windows-only: npm phishing attack laces popular packages with malware theregister.com

How phishing pages admit to being LLM-made - Securelist

How phishing pages admit to being LLM-made Securelist

Itch.io Site Is Back Online After Funko Pop Phishing Dispute - Yahoo

Itch.io Site Is Back Online After Funko Pop Phishing Dispute Yahoo

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office - TechRepublic

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office TechRepublic

Phishing and Wallet Drainer Incidents Statistics 2025: Losses, Trends & Tactics - CoinLaw

Phishing and Wallet Drainer Incidents Statistics 2025: Losses, Trends & Tactics CoinLaw

Playbook of the Week: Phishing for Trouble with Cortex XSOAR - Palo Alto Networks

Playbook of the Week: Phishing for Trouble with Cortex XSOAR Palo Alto Networks

Fake Lawsuit Threat Exposes Privnote Phishing Sites - Krebs on Security

Fake Lawsuit Threat Exposes Privnote Phishing Sites Krebs on Security

Router maker's support portal hacked, replies with MetaMask phishing - BleepingComputer

Router maker's support portal hacked, replies with MetaMask phishing BleepingComputer

Shiba Inu Issues Urgent Warning Over New Phishing Scam Targeting Investors - Coinpaper

Shiba Inu Issues Urgent Warning Over New Phishing Scam Targeting Investors Coinpaper

New Wave of SHTML Phishing Attacks - McAfee

New Wave of SHTML Phishing Attacks McAfee

Disrupting SEABORGIUM’s ongoing phishing operations - Microsoft

Disrupting SEABORGIUM’s ongoing phishing operations Microsoft

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases - The Hacker News

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News

Web3 IPFS Currently Used For Phishing - www.trendmicro.com

Web3 IPFS Currently Used For Phishing www.trendmicro.com

Widespread credential phishing campaign abuses open redirector links - Microsoft

Widespread credential phishing campaign abuses open redirector links Microsoft

Ngrok Misused by Hackers for New Phishing Wave - Cyble

Ngrok Misused by Hackers for New Phishing Wave Cyble

14 Online Scams You Need to Be Aware of—and How to Avoid Them - Reader's Digest

14 Online Scams You Need to Be Aware of—and How to Avoid Them Reader's Digest

Top 10 TLDs Threat Actors Use for Phishing - SOCRadar® Cyber Intelligence Inc.

Top 10 TLDs Threat Actors Use for Phishing SOCRadar® Cyber Intelligence Inc.

Tycoon2FA phishing kit targets Microsoft 365 with new tricks - BleepingComputer

Tycoon2FA phishing kit targets Microsoft 365 with new tricks BleepingComputer

Top 5 Tools for Phishing Domain Detection - SOCRadar® Cyber Intelligence Inc.

Top 5 Tools for Phishing Domain Detection SOCRadar® Cyber Intelligence Inc.

Beware! Tycoon 2FA Phish-kit Exploits Amazon SES to Steal User Credentials - CybersecurityNews

Beware! Tycoon 2FA Phish-kit Exploits Amazon SES to Steal User Credentials CybersecurityNews

Phishing Domain Detection - SOCRadar® Cyber Intelligence Inc.

Phishing Domain Detection SOCRadar® Cyber Intelligence Inc.

Piracema: a Phishing snapshot database for building dataset features - Nature

Piracema: a Phishing snapshot database for building dataset features Nature

‘Ice phishing’ on the blockchain - Microsoft

‘Ice phishing’ on the blockchain Microsoft

Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT - Unit 42

Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT Unit 42

Something’s phishy: How to detect phishing attempts - Malwarebytes

Something’s phishy: How to detect phishing attempts Malwarebytes

Users of biggest NFT marketplace warned over phishing after data leak - The Guardian

Users of biggest NFT marketplace warned over phishing after data leak The Guardian

Hackers Publish List of Phished Discord Credentials - VICE

Hackers Publish List of Phished Discord Credentials VICE

Hybrid Rule-Based Solution for Phishing URL Detection Using Convolutional Neural Network - Wiley Online Library

Hybrid Rule-Based Solution for Phishing URL Detection Using Convolutional Neural Network Wiley Online Library

Itch.io back up after domain taken down by Funko anti-phishing claim - Destructoid

Itch.io back up after domain taken down by Funko anti-phishing claim Destructoid

Top Phishy Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant