www.jerichosecurity.com
Open in
urlscan Pro
2606:2c40::c73c:67e3
Public Scan
Submitted URL: https://jericho-secure.com/
Effective URL: https://www.jerichosecurity.com/
Submission: On January 17 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://www.jerichosecurity.com/
Submission: On January 17 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4
<form id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4"
class="hs-form-private hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5fa48116-1dbb-4776-b480-371b57a3d135 hs-form stacked hs-custom-form row"
target="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" data-instance-id="5fa48116-1dbb-4776-b480-371b57a3d135" data-form-id="3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-portal-id="40243630"
data-test-id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field col-md-9 col-12"><label id="label-email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" class="" placeholder="Enter your "
for="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" name="email" required="" placeholder="email@example.com*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit col-md-3 col-12">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large btn btn-primary" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1737137833142","formDefinitionUpdatedAt":"1725486676336","lang":"en","embedType":"REGULAR","renderRawHtml":"true","convertedFormId":"e48ddef5-e1a3-4397-b856-24271b78cf54","userAgent":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36","pageTitle":"AI-Powered Cyber Security Training for Employees","pageUrl":"https://www.jerichosecurity.com/","pageId":"156743243356","isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.jerichosecurity.com","contentType":"standard-page","hutk":"333dcb2bf1460a02a1c0d806ec46e952","__hsfp":930271884,"__hssc":"191383349.1.1737137834228","__hstc":"191383349.333dcb2bf1460a02a1c0d806ec46e952.1737137834228.1737137834228.1737137834228.1","formTarget":"#hs_form_target_form_87905003","formInstanceId":"5219","rawInlineMessage":"<span style=\"color: #312956;\"><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>","hsFormKey":"0880721b3bc16f2fa82ce868d15fd8b7","pageName":"AI-Powered Cyber Security Training for Employees","rumScriptExecuteTime":879.8000001907349,"rumTotalRequestTime":1157.4000000953674,"rumTotalRenderTime":1184.4000000953674,"rumServiceResponseTime":277.59999990463257,"rumFormRenderTime":27,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1737137834233,"originalEmbedContext":{"portalId":"40243630","formId":"3efa93dc-01e2-44c4-b7fb-2bca23e30be4","region":"na1","target":"#hs_form_target_form_87905003","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"5219","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"<span style=\"color: #312956;\"><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>","isMobileResponsive":true,"rawInlineMessage":"<span style=\"color: #312956;\"><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>","hsFormKey":"0880721b3bc16f2fa82ce868d15fd8b7","pageName":"AI-Powered Cyber Security Training for Employees","pageId":"156743243356","contentType":"standard-page","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"5fa48116-1dbb-4776-b480-371b57a3d135","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.7309","sourceName":"forms-embed","sourceVersion":"1.7309","sourceVersionMajor":"1","sourceVersionMinor":"7309","allPageIds":{"embedContextPageId":"156743243356","analyticsPageId":"156743243356","contentPageId":156743243356,"contentAnalyticsPageId":"156743243356"},"_debug_embedLogLines":[{"clientTimestamp":1737137833262,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1737137833262,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"AI-Powered Cyber Security Training for Employees\",\"pageUrl\":\"https://www.jerichosecurity.com/\",\"userAgent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36\",\"pageId\":\"156743243356\",\"contentAnalyticsPageId\":\"156743243356\",\"contentPageId\":156743243356,\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1737137833263,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1737137834231,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"333dcb2bf1460a02a1c0d806ec46e952\",\"canonicalUrl\":\"https://www.jerichosecurity.com\",\"contentType\":\"standard-page\",\"pageId\":\"156743243356\"}"}]}"><iframe
name="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" style="display: none;"></iframe>
</form>
Text Content
* Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. PLATFORM CYBERSECURITY DASHBOARD Manage Your Security PHISHING SIMULATOR Train Your Employees PERFORMANCE ANALYTICS Gain Key Insights CUSTOMIZED TRAINING Tailored to Your Organization SOLUTIONS CYBERSECURITY AWARENESS TRAINING Train Your Team ANTI-PHISHING TRAINING Protect Your Business ENTERPRISE CYBERSECURITY TRAINING Defend Against Threats SMB CYBERSECURITY TRAINING Empower Your Team INDUSTRIES RETAIL Keep retail threats away E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent sensitive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure sensitive information MANUFACTURING Keep your operation running ENERGY Prevent the next breach FEDERAL GOVERNMENT Prevent largescale attacks STATE & LOCAL GOVERNMENT Protect local officials HIGHER EDUCATION Keep staff & students safe * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines LITERATURE White papers & solution briefs CASE STUDIES Jericho success stories EVENTS Upcoming security events WEBINARS Upcoming & On-Demand COMMUNITY SPOTLIGHT To recognize and appreciate CYBERSECURITY GLOSSARY Cyber-Related Definitions SUPPORT Advice and Answers View All Resources * Partners * Blog * Sign In * Book Demo Sign In Book Demo * Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. PLATFORM CYBERSECURITY DASHBOARD Manage Your Security PHISHING SIMULATOR Train Your Employees PERFORMANCE ANALYTICS Gain Key Insights CUSTOMIZED TRAINING Tailored to Your Organization SOLUTIONS CYBERSECURITY AWARENESS TRAINING Train Your Team ANTI-PHISHING TRAINING Protect Your Business ENTERPRISE CYBERSECURITY TRAINING Defend Against Threats SMB CYBERSECURITY TRAINING Empower Your Team INDUSTRIES RETAIL Keep retail threats away E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent sensitive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure sensitive information MANUFACTURING Keep your operation running ENERGY Prevent the next breach FEDERAL GOVERNMENT Prevent largescale attacks STATE & LOCAL GOVERNMENT Protect local officials HIGHER EDUCATION Keep staff & students safe * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines LITERATURE White papers & solution briefs CASE STUDIES Jericho success stories EVENTS Upcoming security events WEBINARS Upcoming & On-Demand COMMUNITY SPOTLIGHT To recognize and appreciate CYBERSECURITY GLOSSARY Cyber-Related Definitions SUPPORT Advice and Answers View All Resources * Partners * Blog * Sign In * Book Demo Sign In Book Demo AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES Train your team to defend against the latest cyber attacks with our complete AI-powered cyber security training for employees. Book Demo * Generate Attacks * Train Your Team * Automate Reports * Generate Attacks * Train Your Team * Automate Reports LET'S CONNECT ON LINKEDIN Gavin Di Luca gavin@talentbridge.com Greetings Jo, I hope you’re doing well. We are conducting a review of our personnel records and we need you to update your personal information. To help us ensure accuracy and efficiency, could you please reply to this message with the following information: - Full Name - Date of Birth - Home Address - Phone Number This is so we can ensure our records are up-to-date. We apologize for any inconvenience this process may cause, but updating this information is absolutely essential for us to continue our operations. Thank you for your understanding and cooperation! LET'S CONNECT ON LINKEDIN Gavin Di Luca gavin@talentbridge.com Hey Jo, how are you doing? I’m the head of engineering at TalentBridge, and I’m looking to bring new cybersecurity experts to our team. TalentBridge is a startup that helps founders to protect themselves easily when they launch their business online. We are known for believing in Open Source, working remote-only, and striving for a secure web. Your position at Good Org grabbed my interest. If this interests you, here is the job description. Let me know if you’d like to schedule some time to discuss the position. Have a great day! GAVIN DI LUCA Recruiter, TalentBridge Solutions LET'S CONNECT ON LINKEDIN Gavin Di Luca gavin@talentbridge.com Dear Jo Bloggs, My name is Gaving Di Luca, and I am the Security Advisor at Your Company. I am writing to inform you of an urgent security issue that has recently been brought to our attention. Our team has detected a potential breach in our security protocols that may have exposed your personal information to the Dark Web. We believe this breach may have been caused as a result of a recent cyberattack. It is important that you act immediately to protect your information and minimize the risk of this breach. We recommend visiting this site to review our security protocols and assess the risk of data leakage. Please note that this link will take you to a secure website that will ask you to enter your personal information. We take the security of our customers seriously, and we apologize for any inconvenience this may have caused. If you have any questions or concerns, please do not hesitate to contact me immediately. CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST? Sign up for a Demo AI MADE THIS, IS YOUR BUSINESS READY? Run hyper-realistic, scarily personalized attack simulations in just a few clicks with our phishing simulation training platform. * Internal Contact * External Vendor * Dark Web Data * Internal Contact * External Vendor * Dark Web Data CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST? Sign up for a Demo HOW JERICHO'S ANTI-PHISHING TRAINING WORKS. SIMULATE INFINITELY INDIVIDUALIZED ATTACKS FROM CONVINCING CONNECTIONS Jericho learns about your business and uses generative AI to create hyper-realistic simulations that feel like interacting with real people. CREATE AND SCHEDULE EVER-CHANGING CAMPAIGNS IN JUST A FEW CLICKS Keep your team guessing, with suggested tactics to continually train and test your team against likely vulnerabilities. TRACK YOUR TEAM'S PERFORMANCE AND PROGRESS See how your team is performing in granular detail, identify key trends and high risk activity across individuals, groups and roles. PROVIDE PERSONALIZED TRAINING BASED ON PERFORMANCE With engaging resources to elevate security awareness. Automatically escalating difficulty and rewarding for completion. WHY CHOOSE JERICHO'S CYBER SECURITY TRAINING FOR EMPLOYEES? INCREASE CYBER SECURITY EFFICIENCY With tests and training materials tailored to each team member. PREVENT NEW THREATS Replicate techniques used by today's attackers to help your people spot and stop AI generated threats. SAVE TIME & LOWER COST With powerful AI assistance that continually adapts to your business. WHY DO YOU NEED ONLINE CYBER SECURITY AWARENESS TRAINING FOR YOUR EMPLOYEES? 90% OF DATA BREACHES Phishing attacks are responsible for more than 80% of reported incidents and about 90% of data breaches. $8.4T LOST The global cost of cybercrime is predicted to rise from $8.4T to $23.75T within the next five years. 86% OF ORGS At least one person in 86% of organizations clicked a phishing link in 2021. 17% JUMP IN COMPLEXITY Generative AI is rapidly increasinf the persuasiveness of these attacks, with the average linguisitic complexity of these emails jumping by 17%. SUBSCRIBE TO OUR NEWSLETTER Get the latest updates on phishing trends and generative AI Latest stories Unsubscribe anytime PLATFORM * Cybersecurity Dashboard * Phishing Simulator * Performance Analytics * Customized Training SOLUTIONS * Anti-Phishing Training * SMB Cybersecurity Training * Enterprise Cybersecurity Training * Cybersecurity Awareness Training INDUSTRIES * Retail * E-Commerce * Technology * Financial Services * Healthcare * Manufacturing * Energy * Federal Government * State & Local Government * Higher Education RESOURCES * Cybersecurity Glossary * Support * Blog * News * Literature * Case Studies * Events * Webinars * Community Spotlight COMPANY * About Us * Customers * Partners * Careers * Sign In * Get a Demo * Privacy Policy * Terms of Service AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES. Toggle theme * Light * Dark * Auto Copyright © 2025 Jericho Security, Inc.