www.jerichosecurity.com Open in urlscan Pro
2606:2c40::c73c:67e3  Public Scan

Submitted URL: https://jericho-secure.com/
Effective URL: https://www.jerichosecurity.com/
Submission: On January 17 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4

<form id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4"
  class="hs-form-private hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5fa48116-1dbb-4776-b480-371b57a3d135 hs-form stacked hs-custom-form row"
  target="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" data-instance-id="5fa48116-1dbb-4776-b480-371b57a3d135" data-form-id="3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-portal-id="40243630"
  data-test-id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field col-md-9 col-12"><label id="label-email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" class="" placeholder="Enter your "
      for="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" name="email" required="" placeholder="email@example.com*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit col-md-3 col-12">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large btn btn-primary" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1737137833142&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1725486676336&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;convertedFormId&quot;:&quot;e48ddef5-e1a3-4397-b856-24271b78cf54&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;AI-Powered Cyber Security Training for Employees&quot;,&quot;pageUrl&quot;:&quot;https://www.jerichosecurity.com/&quot;,&quot;pageId&quot;:&quot;156743243356&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://www.jerichosecurity.com&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;333dcb2bf1460a02a1c0d806ec46e952&quot;,&quot;__hsfp&quot;:930271884,&quot;__hssc&quot;:&quot;191383349.1.1737137834228&quot;,&quot;__hstc&quot;:&quot;191383349.333dcb2bf1460a02a1c0d806ec46e952.1737137834228.1737137834228.1737137834228.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_form_87905003&quot;,&quot;formInstanceId&quot;:&quot;5219&quot;,&quot;rawInlineMessage&quot;:&quot;<span style=\&quot;color: #312956;\&quot;><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>&quot;,&quot;hsFormKey&quot;:&quot;0880721b3bc16f2fa82ce868d15fd8b7&quot;,&quot;pageName&quot;:&quot;AI-Powered Cyber Security Training for Employees&quot;,&quot;rumScriptExecuteTime&quot;:879.8000001907349,&quot;rumTotalRequestTime&quot;:1157.4000000953674,&quot;rumTotalRenderTime&quot;:1184.4000000953674,&quot;rumServiceResponseTime&quot;:277.59999990463257,&quot;rumFormRenderTime&quot;:27,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1737137834233,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;40243630&quot;,&quot;formId&quot;:&quot;3efa93dc-01e2-44c4-b7fb-2bca23e30be4&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_form_87905003&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;5219&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;<span style=\&quot;color: #312956;\&quot;><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>&quot;,&quot;isMobileResponsive&quot;:true,&quot;rawInlineMessage&quot;:&quot;<span style=\&quot;color: #312956;\&quot;><strong>Submission confirmed. Keep an eye out for our latest Newsletter in your inbox!</strong></span>&quot;,&quot;hsFormKey&quot;:&quot;0880721b3bc16f2fa82ce868d15fd8b7&quot;,&quot;pageName&quot;:&quot;AI-Powered Cyber Security Training for Employees&quot;,&quot;pageId&quot;:&quot;156743243356&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;5fa48116-1dbb-4776-b480-371b57a3d135&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.7309&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.7309&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;7309&quot;,&quot;allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;156743243356&quot;,&quot;analyticsPageId&quot;:&quot;156743243356&quot;,&quot;contentPageId&quot;:156743243356,&quot;contentAnalyticsPageId&quot;:&quot;156743243356&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1737137833262,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1737137833262,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;AI-Powered Cyber Security Training for Employees\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.jerichosecurity.com/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;156743243356\&quot;,\&quot;contentAnalyticsPageId\&quot;:\&quot;156743243356\&quot;,\&quot;contentPageId\&quot;:156743243356,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1737137833263,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1737137834231,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;333dcb2bf1460a02a1c0d806ec46e952\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://www.jerichosecurity.com\&quot;,\&quot;contentType\&quot;:\&quot;standard-page\&quot;,\&quot;pageId\&quot;:\&quot;156743243356\&quot;}&quot;}]}"><iframe
    name="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4_5219" style="display: none;"></iframe>
</form>

Text Content

 * Solutions
   
   
   SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE.
   
   We equip individuals with the knowledge and skills needed to identify,
   prevent, and respond to cyber threats.
   
   PLATFORM
   
   CYBERSECURITY DASHBOARD
   
   Manage Your Security
   
   PHISHING SIMULATOR
   
   Train Your Employees
   
   PERFORMANCE ANALYTICS
   
   Gain Key Insights
   
   CUSTOMIZED TRAINING
   
   Tailored to Your Organization
   
   SOLUTIONS
   
   CYBERSECURITY AWARENESS TRAINING
   
   Train Your Team
   
   ANTI-PHISHING TRAINING
   
   Protect Your Business
   
   ENTERPRISE CYBERSECURITY TRAINING
   
   Defend Against Threats
   
   SMB CYBERSECURITY TRAINING
   
   Empower Your Team
   
   INDUSTRIES
   
   RETAIL
   
   Keep retail threats away
   
   E-COMMERCE
   
   Protect your E-Com Business
   
   TECHNOLOGY
   
   Prevent sensitive breaches
   
   FINANCIAL SERVICES
   
   Safeguard your assets
   
   HEALTHCARE
   
   Secure sensitive information
   
   MANUFACTURING
   
   Keep your operation running
   
   ENERGY
   
   Prevent the next breach
   
   FEDERAL GOVERNMENT
   
   Prevent largescale attacks
   
   STATE & LOCAL GOVERNMENT
   
   Protect local officials
   
   HIGHER EDUCATION
   
   Keep staff & students safe

   
 * Why Jericho
   
   
   WHY CHOOSE JERICHO SECURITY?
   
   See what makes Jericho Security stand out from the rest.
   
   ABOUT US
   
   About our mission
   
   CUSTOMERS
   
   What customers say

   
 * Resources
   
   
   JERICHO SECURITY RESOURCES HUB.
   
   Find everything you need to defend against emerging Generative AI threats.
   
   NEWS
   
   Latest news headlines
   
   LITERATURE
   
   White papers & solution briefs
   
   CASE STUDIES
   
   Jericho success stories
   
   EVENTS
   
   Upcoming security events
   
   WEBINARS
   
   Upcoming & On-Demand
   
   COMMUNITY SPOTLIGHT
   
   To recognize and appreciate
   
   CYBERSECURITY GLOSSARY
   
   Cyber-Related Definitions
   
   SUPPORT
   
   Advice and Answers
   
   View All Resources
 * Partners
 * Blog
 * Sign In
 * Book Demo

Sign In Book Demo
 * Solutions
   
   
   SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE.
   
   We equip individuals with the knowledge and skills needed to identify,
   prevent, and respond to cyber threats.
   
   PLATFORM
   
   CYBERSECURITY DASHBOARD
   
   Manage Your Security
   
   PHISHING SIMULATOR
   
   Train Your Employees
   
   PERFORMANCE ANALYTICS
   
   Gain Key Insights
   
   CUSTOMIZED TRAINING
   
   Tailored to Your Organization
   
   SOLUTIONS
   
   CYBERSECURITY AWARENESS TRAINING
   
   Train Your Team
   
   ANTI-PHISHING TRAINING
   
   Protect Your Business
   
   ENTERPRISE CYBERSECURITY TRAINING
   
   Defend Against Threats
   
   SMB CYBERSECURITY TRAINING
   
   Empower Your Team
   
   INDUSTRIES
   
   RETAIL
   
   Keep retail threats away
   
   E-COMMERCE
   
   Protect your E-Com Business
   
   TECHNOLOGY
   
   Prevent sensitive breaches
   
   FINANCIAL SERVICES
   
   Safeguard your assets
   
   HEALTHCARE
   
   Secure sensitive information
   
   MANUFACTURING
   
   Keep your operation running
   
   ENERGY
   
   Prevent the next breach
   
   FEDERAL GOVERNMENT
   
   Prevent largescale attacks
   
   STATE & LOCAL GOVERNMENT
   
   Protect local officials
   
   HIGHER EDUCATION
   
   Keep staff & students safe

   
 * Why Jericho
   
   
   WHY CHOOSE JERICHO SECURITY?
   
   See what makes Jericho Security stand out from the rest.
   
   ABOUT US
   
   About our mission
   
   CUSTOMERS
   
   What customers say

   
 * Resources
   
   
   JERICHO SECURITY RESOURCES HUB.
   
   Find everything you need to defend against emerging Generative AI threats.
   
   NEWS
   
   Latest news headlines
   
   LITERATURE
   
   White papers & solution briefs
   
   CASE STUDIES
   
   Jericho success stories
   
   EVENTS
   
   Upcoming security events
   
   WEBINARS
   
   Upcoming & On-Demand
   
   COMMUNITY SPOTLIGHT
   
   To recognize and appreciate
   
   CYBERSECURITY GLOSSARY
   
   Cyber-Related Definitions
   
   SUPPORT
   
   Advice and Answers
   
   View All Resources
 * Partners
 * Blog
 * Sign In
 * Book Demo

Sign In Book Demo


AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES

Train your team to defend against the latest cyber attacks with our complete
AI-powered cyber security training for employees.

Book Demo
 * Generate Attacks
 * Train Your Team
 * Automate Reports

 * Generate Attacks
 * Train Your Team
 * Automate Reports

LET'S CONNECT ON LINKEDIN

Gavin Di Luca

gavin@talentbridge.com

Greetings Jo,

I hope you’re doing well. We are conducting a review of our personnel records
and we need you to update your personal information. To help us ensure accuracy
and efficiency, could you please reply to this message with the following
information:

- Full Name
- Date of Birth
- Home Address
- Phone Number

This is so we can ensure our records are up-to-date. We apologize for any
inconvenience this process may cause, but updating this information is
absolutely essential for us to continue our operations.

Thank you for your understanding and cooperation!

LET'S CONNECT ON LINKEDIN

Gavin Di Luca

gavin@talentbridge.com

Hey Jo, how are you doing?

I’m the head of engineering at TalentBridge, and I’m looking to bring new
cybersecurity experts to our team.

TalentBridge is a startup that helps founders to protect themselves easily when
they launch their business online. We are known for believing in Open Source,
working remote-only, and striving for a secure web.

Your position at Good Org grabbed my interest.

If this interests you, here is the job description.

Let me know if you’d like to schedule some time to discuss the position.

Have a great day!

GAVIN DI LUCA

Recruiter, TalentBridge Solutions

LET'S CONNECT ON LINKEDIN

Gavin Di Luca

gavin@talentbridge.com

Dear Jo Bloggs,

My name is Gaving Di Luca, and I am the Security Advisor at Your Company. I am
writing to inform you of an urgent security issue that has recently been brought
to our attention.

Our team has detected a potential breach in our security protocols that may have
exposed your personal information to the Dark Web. We believe this breach may
have been caused as a result of a recent cyberattack.

It is important that you act immediately to protect your information and
minimize the risk of this breach. We recommend visiting this site to review our
security protocols and assess the risk of data leakage. Please note that this
link will take you to a secure website that will ask you to enter your personal
information.

We take the security of our customers seriously, and we apologize for any
inconvenience this may have caused.

If you have any questions or concerns, please do not hesitate to contact me
immediately.

CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST?

Sign up for a Demo


AI MADE THIS, IS YOUR BUSINESS READY?

Run hyper-realistic, scarily personalized attack simulations in just a few
clicks with our phishing simulation training platform.

 * Internal Contact
 * External Vendor
 * Dark Web Data

 * Internal Contact
 * External Vendor
 * Dark Web Data

CURIOUS HOW MANY OF YOUR EMPLOYEES WOULD PASS A DYNAMIC PHISHING TEST?

Sign up for a Demo


HOW JERICHO'S ANTI-PHISHING TRAINING WORKS.

 


SIMULATE INFINITELY INDIVIDUALIZED ATTACKS FROM CONVINCING CONNECTIONS

Jericho learns about your business and uses generative AI to create
hyper-realistic simulations that feel like interacting with real people.


CREATE AND SCHEDULE EVER-CHANGING CAMPAIGNS IN JUST A FEW CLICKS

Keep your team guessing, with suggested tactics to continually train and test
your team against likely vulnerabilities.


TRACK YOUR TEAM'S PERFORMANCE AND PROGRESS

See how your team is performing in granular detail, identify key trends and high
risk activity across individuals, groups and roles.


PROVIDE PERSONALIZED TRAINING BASED ON PERFORMANCE

With engaging resources to elevate security awareness. Automatically escalating
difficulty and rewarding for completion.


WHY CHOOSE JERICHO'S
CYBER SECURITY TRAINING
FOR EMPLOYEES?


INCREASE CYBER
SECURITY EFFICIENCY

With tests and training materials tailored to each team member.


PREVENT NEW THREATS

Replicate techniques used by today's attackers to help your people spot and stop
AI generated threats.


SAVE TIME & LOWER COST

With powerful AI assistance that continually adapts to your business.




WHY DO YOU NEED ONLINE CYBER SECURITY AWARENESS TRAINING FOR YOUR EMPLOYEES?


90% OF DATA BREACHES

Phishing attacks are responsible for more than 80% of reported incidents and
about 90% of data breaches.


$8.4T LOST

The global cost of cybercrime is predicted to rise from $8.4T to $23.75T within
the next five years.


86% OF ORGS

At least one person in 86% of organizations clicked a phishing link in 2021.


17% JUMP IN COMPLEXITY

Generative AI is rapidly increasinf the persuasiveness of these attacks, with
the average linguisitic complexity of these emails jumping by 17%.


SUBSCRIBE TO OUR NEWSLETTER

Get the latest updates on phishing trends and generative AI


Latest stories Unsubscribe anytime

PLATFORM

 * Cybersecurity Dashboard
 * Phishing Simulator
 * Performance Analytics
 * Customized Training

SOLUTIONS

 * Anti-Phishing Training
 * SMB Cybersecurity Training
 * Enterprise Cybersecurity Training
 * Cybersecurity Awareness Training

INDUSTRIES

 * Retail
 * E-Commerce
 * Technology
 * Financial Services
 * Healthcare
 * Manufacturing
 * Energy
 * Federal Government
 * State & Local Government
 * Higher Education

RESOURCES

 * Cybersecurity Glossary
 * Support
 * Blog
 * News
 * Literature
 * Case Studies
 * Events
 * Webinars
 * Community Spotlight

COMPANY

 * About Us
 * Customers
 * Partners
 * Careers
 * Sign In
 * Get a Demo
 * Privacy Policy
 * Terms of Service

AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES.

Toggle theme
 * Light
 * Dark
 * Auto

Copyright © 2025 Jericho Security, Inc.