www.jerichosecurity.com
Open in
urlscan Pro
2606:2c40::c73c:671d
Public Scan
URL:
https://www.jerichosecurity.com/
Submission: On August 11 via automatic, source certstream-suspicious — Scanned from DE
Submission: On August 11 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4
<form id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4"
class="hs-form-private hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_9bd0e51e-2793-42fd-a773-0bead1dbacc4 hs-form stacked"
target="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-instance-id="9bd0e51e-2793-42fd-a773-0bead1dbacc4" data-form-id="3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-portal-id="40243630"
data-test-id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" class="" placeholder="Enter your " for="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" name="email" required="" placeholder="email@example.com*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Join"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1723336042065","formDefinitionUpdatedAt":"1718653673498","lang":"en","embedType":"REGULAR","renderRawHtml":"true","convertedFormId":"e48ddef5-e1a3-4397-b856-24271b78cf54","userAgent":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36","pageTitle":"AI-Powered Cyber Security Training for Employees","pageUrl":"https://www.jerichosecurity.com/","pageId":"156743243356","isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.jerichosecurity.com","contentType":"standard-page","hutk":"9dfbe17316eddaa3da29d516c5072ff3","__hsfp":1240600147,"__hssc":"191383349.1.1723336043434","__hstc":"191383349.9dfbe17316eddaa3da29d516c5072ff3.1723336043434.1723336043434.1723336043434.1","formTarget":"#hbspt-form-9bd0e51e-2793-42fd-a773-0bead1dbacc4","rumScriptExecuteTime":1683.1000000089407,"rumTotalRequestTime":2440.5,"rumTotalRenderTime":2654.1000000089407,"rumServiceResponseTime":757.3999999910593,"rumFormRenderTime":213.6000000089407,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1723336043476,"originalEmbedContext":{"portalId":"40243630","formId":"3efa93dc-01e2-44c4-b7fb-2bca23e30be4","region":"na1","target":"#hbspt-form-9bd0e51e-2793-42fd-a773-0bead1dbacc4","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"9bd0e51e-2793-42fd-a773-0bead1dbacc4","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.5781","sourceName":"forms-embed","sourceVersion":"1.5781","sourceVersionMajor":"1","sourceVersionMinor":"5781","allPageIds":{"analyticsPageId":"156743243356","contentPageId":156743243356,"contentAnalyticsPageId":"156743243356"},"_debug_embedLogLines":[{"clientTimestamp":1723336042322,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"AI-Powered Cyber Security Training for Employees\",\"pageUrl\":\"https://www.jerichosecurity.com/\",\"userAgent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36\",\"pageId\":\"156743243356\",\"contentAnalyticsPageId\":\"156743243356\",\"contentPageId\":156743243356,\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1723336042323,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1723336043471,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"9dfbe17316eddaa3da29d516c5072ff3\",\"canonicalUrl\":\"https://www.jerichosecurity.com\",\"contentType\":\"standard-page\",\"pageId\":\"156743243356\"}"}]}"><iframe
name="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" style="display: none;"></iframe>
</form>
Text Content
* Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. INDUSTRIES E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent senstive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure senstive information MANUFACTURING Keep your operation running * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines EVENTS Upcoming security events View All Resources WEBINARS Upcoming & On-Demand CASE STUDIES Jericho success stories COMMUNITY SPOTLIGHT To recognize and appreciate LITERATURE White papers & solution briefs * Partners * Blog Sign In Book Demo * Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. INDUSTRIES E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent senstive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure senstive information MANUFACTURING Keep your operation running * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines EVENTS Upcoming security events View All Resources WEBINARS Upcoming & On-Demand CASE STUDIES Jericho success stories COMMUNITY SPOTLIGHT To recognize and appreciate LITERATURE White papers & solution briefs * Partners * Blog Sign In Book Demo AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES Train your team to defend against the latest cyber attacks with our complete AI-powered cyber security training for employees. Book Demo * Generate Attacks * Train Your Team * Automate Reports * Generate Attacks * Train Your Team * Automate Reports LET'S CONNECT ON LINKEDIN GAVIN DI LUCA gavin@talentbridge.com Greetings Jo, I hope you’re doing well. We are conducting a review of our personnel records and we need you to update your personal information. To help us ensure accuracy and efficiency, could you please reply to this message with the following information: - Full Name - Date of Birth - Home Address - Phone Number This is so we can ensure our records are up-to-date. We apologize for any inconvenience this process may cause, but updating this information is absolutely essential for us to continue our operations. Thank you for your understanding and cooperation! LET'S CONNECT ON LINKEDIN GAVIN DI LUCA gavin@talentbridge.com Hey Jo, how are you doing? I’m the head of engineering at TalentBridge, and I’m looking to bring new cybersecurity experts to our team. TalentBridge is a startup that helps founders to protect themselves easily when they launch their business online. We are known for believing in Open Source, working remote-only, and striving for a secure web. Your position at Good Org grabbed my interest. If this interests you, here is the job description. Let me know if you’d like to schedule some time to discuss the position. Have a great day! GAVIN DI LUCA Recruiter, TalentBridge Solutions LET'S CONNECT ON LINKEDIN GAVIN DI LUCA gavin@talentbridge.com Dear Jo Bloggs, My name is Gaving Di Luca, and I am the Security Advisor at Your Company. I am writing to inform you of an urgent security issue that has recently been brought to our attention. Our team has detected a potential breach in our security protocols that may have exposed your personal information to the Dark Web. We believe this breach may have been caused as a result of a recent cyberattack. It is important that you act immediately to protect your information and minimize the risk of this breach. We recommend visiting this site to review our security protocols and assess the risk of data leakage. Please note that this link will take you to a secure website that will ask you to enter your personal information. We take the security of our customers seriously, and we apologize for any inconvenience this may have caused. If you have any questions or concerns, please do not hesitate to contact me immediately. CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A PHISHING TEST? Sign up for a Demo AI MADE THIS, IS YOUR BUSINESS READY? Run hyper-realistic, scarily personalized attack simulations in just a few clicks with our phishing simulation training platform. * Internal Contact * External Vendor * Dark Web Data * Internal Contact * External Vendor * Dark Web Data CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST? Sign up for our Free Trial HOW JERICHO'S ANTI-PHISHING TRAINING WORKS. SIMULATE INFINITELY INDIVIDUALIZED ATTACKS FROM CONVINCING CONNECTIONS Jericho learns about your business and uses generative AI to create hyper-realistic simulations that feel like interacting with real people. CREATE AND SCHEDULE EVER-CHANGING CAMPAIGNS IN JUST A FEW CLICKS Keep your team guessing, with suggested tactics to continually train and test your team against likely vulnerabilities. TRACK YOUR TEAM'S PERFORMACE AND PROGRESS See how your team is performing in granular detail, identify key trends and high risk activity across individuals, groups and roles. PROVIDE PERSONALIZED TRAINING BASED ON PERFORMANCE With engaging resources to elevate security awareness. Automatically escalating difficulty and rewarding for completion. WHY CHOOSE JERICHO'S CYBER SECURITY TRAINING FOR EMPLOYEES? INCREASE CYBER SECURITY EFFICIENCY With tests and training materials tailored to each team member. PREVENT NEW THREATS Replicate techniques used by today's attackers to help your people spot and stop AI generated threats. SAVE TIME & LOWER COST With powerful AI assistance that continually adapts to your business. WHY DO YOU NEED ONLINE CYBER SECURITY AWARENESS TRAINING FOR YOUR EMPLOYEES? 90% OF DATA BREACHES Phishing attacks are responsible for more than 80% of reported incidents and about 90% of data breaches. 86% OF ORGS At least one person in 86% of organizations clicked a phishing link in 2021. $8.4T LOST The global cost of cybercrime is predicted to rise from $8.4T to $23.75T within the next five years. 17% JUMP IN COMPLEXITY Generative AI is rapidly increasinf the persuasiveness of these attacks, with the average linguisitic complexity of these emails jumping by 17%. SUBSCRIBE TO OUR NEWSLETTER Get the latest updates on phishing trends and generative AI Subscribe Latest stories Unsubscribe anytime AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES. AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES. PAGES * About Us * Partners * Customers * Resources * Get a Demo RESOURCES * Careers * Sign In * Privacy Policy * Terms of Service Copyright © 2024 Jericho Security, Inc.