โš  THREAT AWARENESS TRAINING

PHISHSHIELD

// THE FALSE BOTTOM

The world's most advanced phishing detection training platform.
Learn to spot deception hiding beneath every email, call, and link.

3.4BPhishing emails sent daily
91%Of data breaches start with phishing
$4.9MAverage breach cost in 2024
17sTo click a phishing link

Your Training Arsenal

Everything you need to become a human firewall.

๐ŸŽฏ

Detection Challenge

5 real-world phishing scenarios with X-Ray email analysis. Earn your Security IQ.

๐ŸŽฎ

4 Security Games

Phish or Legit, URL Detective, Attack Quiz, Social Engineering Survival.

๐Ÿ“–

Attack Encyclopedia

Deep-dive into 8 attack vectors with real-world examples and red flags.

๐Ÿค–

AI Phish Simulator

Generate personalized phishing attacks for any role. No API key needed.

// threat intelligence

Know Your Threats

8 distinct attack vectors that compromise millions every year. Click any to explore in depth.

VOICE
๐Ÿ“ž

Vishing

Fraudulent calls impersonating IRS, banks & tech support to steal credentials in real time.

RISK LEVEL
CRITICAL
๐Ÿ”ด CALLER ID SPOOFED
"Your account has been frozen."
โ†’ Requesting your OTPโ€ฆ
SMS
๐Ÿ’ฌ

Smishing

Malicious texts mimicking banks, couriers & services with lookalike URLs.

RISK LEVEL
HIGH
DNS
๐ŸŒ

Pharming

Silently redirects correct URLs to malicious copycat sites via DNS hijacking.

RISK LEVEL
HIGH
QR
๐Ÿ“ท

Quishing

Malicious QR codes in public places & emails that bypass link scanners.

RISK LEVEL
MED
EMAIL
๐Ÿ“ง

Clone Phishing

Exact replicas of real emails you've received โ€” same content, same sender look, but all links replaced with malicious ones.

RISK LEVEL
CRITICAL
From: docusign@docu-sign-secure.com
โš  SPOOFED โ€” Real: docusign@docusign.com
โ†’ Link replaced with malicious URL
WI-FI
๐Ÿ“ถ

Evil Twin

Fake Wi-Fi hotspot intercepts all traffic via man-in-the-middle attack.

RISK LEVEL
HIGH
SOCIAL
๐ŸŽฃ

Angler Phishing

Fake support accounts on social media targeting users who complain.

RISK LEVEL
MED
Ready to test yourself?
Can you spot all 8 attack types in the wild?

ACCESS TERMINAL

Enter credentials to continue

New agent? Create account

Welcome back,

Your cybersecurity training command centre

๐Ÿง 
SECURITY IQ
โ€”
๐Ÿ†
GLOBAL RANK
โ€”
๐ŸŽ–๏ธ
TITLE
โ€”
๐ŸŽฎ
GAME POINTS
0
๐ŸŽฏ

Detection Challenge

5-scenario quiz. Earn your Security IQ.

๐ŸŽฎ

Mini Games

4 security games. Earn points.

๐Ÿ“–

Attack Encyclopedia

Deep-dive into all 8 attack types.

๐Ÿ“Š

Leaderboard

See your global ranking live.

Scenario 1 of 5 Score: 0

๐Ÿ’ก Hover over sender & links to use X-Ray, then decide:

๐Ÿ›ก๏ธ

Training Complete

SECURITY IQ SCORE

๐ŸŽฎ Security Games

Sharpen your cyber instincts โ€” each game earns points on the leaderboard.

๐Ÿƒ

Phish or Legit?

Swipe-style rapid decision game

10 emails flash by โ€” judge each as phishing or legitimate. Race against the clock!

โšก Up to 200 pts
๐Ÿ”—

URL Detective

Spot the fake URL challenge

Pick the malicious URL from a pair of look-alikes. 8 rounds with speed bonus!

โšก Up to 160 pts
๐Ÿงฉ

Attack Type Quiz

Identify the attack category

Read a scenario and name the attack โ€” vishing, smishing, pharming, and more!

โšก Up to 150 pts
๐Ÿ•ต๏ธ

Social Eng. Survival

Story-based decision scenarios

Navigate real social engineering scenarios. One wrong move and you're compromised!

โšก Up to 180 pts

๐Ÿ… Your Best Scores

Attack Encyclopedia

Eight distinct phishing attack vectors โ€” each with detailed breakdowns, real-world examples, red flags, and visual simulations.

3.4BPhishing emails sent daily
91%Of breaches start with phishing
$4.9MAverage breach cost 2024
17sTime to click a phishing link

How to Stay Protected

Practical countermeasures every person and organization should implement today.

๐Ÿ”

Enable MFA Everywhere

Multi-factor authentication stops 99.9% of automated attacks even if your password is stolen.

๐Ÿ”—

Hover Before You Click

Always hover over links to preview the real destination URL before clicking anything in an email.

๐Ÿ“ž

Verify Out-of-Band

If a call or message requests urgent action, hang up and call back using a number you look up independently.

๐ŸŒ

Check HTTPS & Domains

Look for padlock icons and verify exact domain spelling. Attackers use subtle typos like paypai.com.

๐Ÿ“ฑ

Don't Trust Unknown QR Codes

Preview QR destinations before opening. Be especially skeptical of QR codes in public places.

๐Ÿค–

Establish Voice Codes

Create a safe word with executives and finance teams to verify identity during unusual requests โ€” especially for wire transfers.

AI Phish Simulator

Generate personalized phishing attacks for any role using AI. X-Ray mode enabled on all links.

Select Target Role

๐Ÿ†

Global Leaderboard

Rankings from quiz & game performance โ€” updates live

RANK
AGENT
TITLE
IQ

Complete the Quiz to earn your global rank. Game points add bonus XP.

๐Ÿšฉ Report-a-Phish Hub

Paste a suspicious email for instant AI threat analysis.