www.jerichosecurity.com Open in urlscan Pro
2606:2c40::c73c:671d  Public Scan

URL: https://www.jerichosecurity.com/
Submission: On August 11 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4

<form id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4"
  class="hs-form-private hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_9bd0e51e-2793-42fd-a773-0bead1dbacc4 hs-form stacked"
  target="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-instance-id="9bd0e51e-2793-42fd-a773-0bead1dbacc4" data-form-id="3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-portal-id="40243630"
  data-test-id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" class="" placeholder="Enter your " for="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" name="email" required="" placeholder="email@example.com*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Join"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1723336042065&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1718653673498&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;convertedFormId&quot;:&quot;e48ddef5-e1a3-4397-b856-24271b78cf54&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;AI-Powered Cyber Security Training for Employees&quot;,&quot;pageUrl&quot;:&quot;https://www.jerichosecurity.com/&quot;,&quot;pageId&quot;:&quot;156743243356&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://www.jerichosecurity.com&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;9dfbe17316eddaa3da29d516c5072ff3&quot;,&quot;__hsfp&quot;:1240600147,&quot;__hssc&quot;:&quot;191383349.1.1723336043434&quot;,&quot;__hstc&quot;:&quot;191383349.9dfbe17316eddaa3da29d516c5072ff3.1723336043434.1723336043434.1723336043434.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-9bd0e51e-2793-42fd-a773-0bead1dbacc4&quot;,&quot;rumScriptExecuteTime&quot;:1683.1000000089407,&quot;rumTotalRequestTime&quot;:2440.5,&quot;rumTotalRenderTime&quot;:2654.1000000089407,&quot;rumServiceResponseTime&quot;:757.3999999910593,&quot;rumFormRenderTime&quot;:213.6000000089407,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1723336043476,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;40243630&quot;,&quot;formId&quot;:&quot;3efa93dc-01e2-44c4-b7fb-2bca23e30be4&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-9bd0e51e-2793-42fd-a773-0bead1dbacc4&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;9bd0e51e-2793-42fd-a773-0bead1dbacc4&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.5781&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.5781&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;5781&quot;,&quot;allPageIds&quot;:{&quot;analyticsPageId&quot;:&quot;156743243356&quot;,&quot;contentPageId&quot;:156743243356,&quot;contentAnalyticsPageId&quot;:&quot;156743243356&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1723336042322,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;AI-Powered Cyber Security Training for Employees\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.jerichosecurity.com/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;156743243356\&quot;,\&quot;contentAnalyticsPageId\&quot;:\&quot;156743243356\&quot;,\&quot;contentPageId\&quot;:156743243356,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1723336042323,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1723336043471,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;9dfbe17316eddaa3da29d516c5072ff3\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://www.jerichosecurity.com\&quot;,\&quot;contentType\&quot;:\&quot;standard-page\&quot;,\&quot;pageId\&quot;:\&quot;156743243356\&quot;}&quot;}]}"><iframe
    name="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" style="display: none;"></iframe>
</form>

Text Content

 * Solutions
   
   
   SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE.
   
   We equip individuals with the knowledge and skills needed to identify,
   prevent, and respond to cyber threats.
   
   INDUSTRIES
   
   E-COMMERCE
   
   Protect your E-Com Business
   
   TECHNOLOGY
   
   Prevent senstive breaches
   
   FINANCIAL SERVICES
   
   Safeguard your assets
   
   HEALTHCARE
   
   Secure senstive information
   
   MANUFACTURING
   
   Keep your operation running

   
 * Why Jericho
   
   
   WHY CHOOSE JERICHO SECURITY?
   
   See what makes Jericho Security stand out from the rest.
   
   ABOUT US
   
   About our mission
   
   CUSTOMERS
   
   What customers say

   
 * Resources
   
   
   JERICHO SECURITY RESOURCES HUB.
   
   Find everything you need to defend against emerging Generative AI threats.
   
   NEWS
   
   Latest news headlines
   
   EVENTS
   
   Upcoming security events
   
   View All Resources
   
   WEBINARS
   
   Upcoming & On-Demand
   
   CASE STUDIES
   
   Jericho success stories
   
   COMMUNITY SPOTLIGHT
   
   To recognize and appreciate
   
   LITERATURE
   
   White papers & solution briefs

 * Partners
 * Blog

Sign In Book Demo
 * Solutions
   
   
   SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE.
   
   We equip individuals with the knowledge and skills needed to identify,
   prevent, and respond to cyber threats.
   
   INDUSTRIES
   
   E-COMMERCE
   
   Protect your E-Com Business
   
   TECHNOLOGY
   
   Prevent senstive breaches
   
   FINANCIAL SERVICES
   
   Safeguard your assets
   
   HEALTHCARE
   
   Secure senstive information
   
   MANUFACTURING
   
   Keep your operation running

   
 * Why Jericho
   
   
   WHY CHOOSE JERICHO SECURITY?
   
   See what makes Jericho Security stand out from the rest.
   
   ABOUT US
   
   About our mission
   
   CUSTOMERS
   
   What customers say

   
 * Resources
   
   
   JERICHO SECURITY RESOURCES HUB.
   
   Find everything you need to defend against emerging Generative AI threats.
   
   NEWS
   
   Latest news headlines
   
   EVENTS
   
   Upcoming security events
   
   View All Resources
   
   WEBINARS
   
   Upcoming & On-Demand
   
   CASE STUDIES
   
   Jericho success stories
   
   COMMUNITY SPOTLIGHT
   
   To recognize and appreciate
   
   LITERATURE
   
   White papers & solution briefs

 * Partners
 * Blog

Sign In Book Demo


AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES

Train your team to defend against the latest cyber attacks with our complete
AI-powered cyber security training for employees.

Book Demo

 * Generate Attacks
 * Train Your Team
 * Automate Reports

 * Generate Attacks
 * Train Your Team
 * Automate Reports

LET'S CONNECT ON LINKEDIN

GAVIN DI LUCA

gavin@talentbridge.com

Greetings Jo,

I hope you’re doing well. We are conducting a review of our personnel records
and we need you to update your personal information. To help us ensure accuracy
and efficiency, could you please reply to this message with the following
information:

- Full Name
- Date of Birth
- Home Address
- Phone Number

This is so we can ensure our records are up-to-date. We apologize for any
inconvenience this process may cause, but updating this information is
absolutely essential for us to continue our operations.

Thank you for your understanding and cooperation!

LET'S CONNECT ON LINKEDIN

GAVIN DI LUCA

gavin@talentbridge.com

Hey Jo, how are you doing?

I’m the head of engineering at TalentBridge, and I’m looking to bring new
cybersecurity experts to our team.

TalentBridge is a startup that helps founders to protect themselves easily when
they launch their business online. We are known for believing in Open Source,
working remote-only, and striving for a secure web.

Your position at Good Org grabbed my interest.

If this interests you, here is the job description.

Let me know if you’d like to schedule some time to discuss the position.

Have a great day!

GAVIN DI LUCA

Recruiter, TalentBridge Solutions

LET'S CONNECT ON LINKEDIN

GAVIN DI LUCA

gavin@talentbridge.com

Dear Jo Bloggs,

My name is Gaving Di Luca, and I am the Security Advisor at Your Company. I am
writing to inform you of an urgent security issue that has recently been brought
to our attention.

Our team has detected a potential breach in our security protocols that may have
exposed your personal information to the Dark Web. We believe this breach may
have been caused as a result of a recent cyberattack.

It is important that you act immediately to protect your information and
minimize the risk of this breach. We recommend visiting this site to review our
security protocols and assess the risk of data leakage. Please note that this
link will take you to a secure website that will ask you to enter your personal
information.

We take the security of our customers seriously, and we apologize for any
inconvenience this may have caused.

If you have any questions or concerns, please do not hesitate to contact me
immediately.

CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A PHISHING TEST?

Sign up for a Demo


AI MADE THIS, IS YOUR BUSINESS READY?

Run hyper-realistic, scarily personalized attack simulations in just a few
clicks with our phishing simulation training platform.

 * Internal Contact
 * External Vendor
 * Dark Web Data

 * Internal Contact
 * External Vendor
 * Dark Web Data

CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST?

Sign up for our Free Trial


HOW JERICHO'S ANTI-PHISHING TRAINING WORKS.


SIMULATE INFINITELY INDIVIDUALIZED ATTACKS FROM CONVINCING CONNECTIONS

Jericho learns about your business and uses generative AI to create
hyper-realistic simulations that feel like interacting with real people.


CREATE AND SCHEDULE EVER-CHANGING CAMPAIGNS IN JUST A FEW CLICKS

Keep your team guessing, with suggested tactics to continually train and test
your team against likely vulnerabilities.


TRACK YOUR TEAM'S PERFORMACE AND PROGRESS

See how your team is performing in granular detail, identify key trends and high
risk activity across individuals, groups and roles.


PROVIDE PERSONALIZED TRAINING BASED ON PERFORMANCE

With engaging resources to elevate security awareness. Automatically escalating
difficulty and rewarding for completion.


WHY CHOOSE JERICHO'S
CYBER SECURITY TRAINING
FOR EMPLOYEES?


INCREASE CYBER
SECURITY EFFICIENCY

With tests and training materials tailored to each team member.


PREVENT NEW THREATS

Replicate techniques used by today's attackers to help your people spot and stop
AI generated threats.


SAVE TIME & LOWER COST

With powerful AI assistance that continually adapts to your business.




WHY DO YOU NEED ONLINE CYBER SECURITY AWARENESS TRAINING FOR YOUR EMPLOYEES?


90% OF DATA BREACHES

Phishing attacks are responsible for more than 80% of reported incidents and
about 90% of data breaches.


86% OF ORGS

At least one person in 86% of organizations clicked a phishing link in 2021.


$8.4T LOST

The global cost of cybercrime is predicted to rise from $8.4T to $23.75T within
the next five years.


17% JUMP IN COMPLEXITY

Generative AI is rapidly increasinf the persuasiveness of these attacks, with
the average linguisitic complexity of these emails jumping by 17%.


SUBSCRIBE TO OUR NEWSLETTER

Get the latest updates on phishing trends and generative AI

Subscribe
Latest stories Unsubscribe anytime

AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES.

AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES.



PAGES

 * About Us
 * Partners
 * Customers
 * Resources
 * Get a Demo

RESOURCES

 * Careers
 * Sign In
 * Privacy Policy
 * Terms of Service

Copyright © 2024 Jericho Security, Inc.