{"id":49809,"date":"2025-07-07T13:38:24","date_gmt":"2025-07-07T13:38:24","guid":{"rendered":"https:\/\/www.cyberguru.it\/phishpro\/"},"modified":"2025-09-01T13:30:03","modified_gmt":"2025-09-01T13:30:03","slug":"phishpro","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/phishpro\/","title":{"rendered":"PhishPro"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp&#8220; custom_margin=&#8220;0px||0px||true|false&#8220; custom_padding=&#8220;0px||0px||true|false&#8220; bottom_divider_color=&#8220;#0C71C3&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;24vh||10vh|10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>PhishPro<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; global_colors_info=&#8220;{}&#8220;]Trainingsplattform \/ <span style=\"color: #f18a00;\">PhishPro<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_enable_image=&#8220;off&#8220; background_position=&#8220;top_center&#8220; min_height=&#8220;609.5px&#8220; custom_margin=&#8220;||-62px|0px|false|false&#8220; custom_padding=&#8220;||17px|0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;556.4px&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Fortgeschrittenes Anti-Phishing-Training<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px|0px|20px||false|false&#8220; custom_padding=&#8220;|0px|||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Im neuen Szenario der Cyber-Bedrohungen bleibt Phishing einer der am weitesten verbreiteten und heimt\u00fcckischsten Angriffsvektoren. Die Techniken entwickeln sich schnell weiter, werden immer ausgefeilter und \u00fcberzeugender und verbreiten sich \u00fcber immer vielf\u00e4ltigere Kan\u00e4le, wie Deepfake-Videos, QR-Codes und USB-Ger\u00e4te.  <\/span><span style=\"color: #000000;\">Cyber Guru <strong><em>PhishPro<\/em> ist die fortschrittliche Erweiterung des Cyber Guru Phishing-Programms<\/strong>, die entwickelt wurde, um ein noch realistischeres, immersiveres und in den digitalen Alltag der Benutzer integriertes Training zu bieten. <\/span><\/p>\n<p><span style=\"color: #000000;\">Das PhishPro Add-on erweitert die Simulationen um \u00dcbungen mit <strong>Video-Angriffen\/Deepfakes, USB-Sticks und QR-Codes. <\/strong><\/span><span style=\"color: #000000;\">Die Anti-Phishing-Schulung nutzt die Funktionalit\u00e4t der <strong>Adaptive Learning Remediation<\/strong>, um einen zielgerichteten und kontextuellen Lernpfad zu gew\u00e4hrleisten, der zur St\u00e4rkung der realen Kompetenzen und zur Verbesserung der operativen Bereitschaft jedes Benutzers erforderlich ist.<\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter||||||||&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter||||||||&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: left;\"><strong><span style=\"color: #000000;\">Viele Vorteile in einem einzigen Add-on:<\/span><\/strong><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p>Realistische Simulationen auf mehreren Kan\u00e4len<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p>Kontinuierliches, adaptives und personalisiertes Lernen<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p>Kontextuelles, messbares und risikogerechtes Training<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p>Konkrete Reduzierung des Risikos durch menschliches Versagen<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p>Perfekte Integration in das Cyber Guru Phishing-Programm<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Sezione&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_stops=&#8220;#010512 0%|#071036 100%&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #ffffff;\">Fortgeschrittene Simulationen, <\/span><\/strong><\/h2>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #ffffff;\">um realen Angriffen zu begegnen<\/span><\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_enable_image=&#8220;off&#8220; background_position=&#8220;top_center&#8220; min_height=&#8220;609.5px&#8220; custom_margin=&#8220;||-62px|0px|false|false&#8220; custom_padding=&#8220;||17px|0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;715px&#8220; custom_margin=&#8220;21px|auto||auto||&#8220; custom_padding=&#8220;0px|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_padding_tablet=&#8220;|8%|||false|false&#8220; custom_padding_phone=&#8220;|2%||2%|false|true&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Simulation von Videoangriffen (Deepfake)<\/h2>\n<p data-start=\"236\" data-end=\"290\">Fortgeschrittenes Training gegen Video- und Deepfake-Angriffe<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Es erm\u00f6glicht die Simulation von E-Mails mit gef\u00e4lschten Videoinhalten, die scheinbar autorit\u00e4re oder bekannte Personen zeigen und einen Videoangriff reproduzieren. Ziel ist es, die Benutzer darin zu schulen, emotionale Manipulationen und die immer ausgefeilteren Social-Engineering-Techniken zu erkennen.  <\/span><span style=\"color: #000000;\">Durch die Verwendung spezifischer Vorlagen reproduziert das Add-on Szenarien, in denen das Gef\u00fchl der Dringlichkeit und die Vertrautheit mit dem Gespr\u00e4chspartner ausgenutzt werden, um den Empf\u00e4nger zu impulsiven Handlungen oder zur Weitergabe sensibler Informationen zu verleiten.<\/span><\/p>\n<p><span style=\"color: #000000;\">PhishPro verbessert die Schulung, indem es den Supervisoren die M\u00f6glichkeit bietet:<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<strong>auf Beispielskripte f\u00fcr die Erstellung simulierter Deepfake-Videos zuzugreifen<\/strong>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<strong>spezifische E-Mail-Vorlagen f\u00fcr Video-\/Deepfake-Angriffsszenarien zu verwenden<\/strong>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<strong>die Ergebnisse mittels detaillierter Berichte und dedizierter Dashboards zu \u00fcberwachen<\/strong>[\/et_pb_blurb][dipl_button _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/dipl_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/Deepfake_Video_Attack_Mockup_DE.webp&#8220; alt=&#8220;Deepfake_Video_Attack_Mockup_DE&#8220; title_text=&#8220;Deepfake_Video_Attack_Mockup_DE&#8220; align=&#8220;center&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_padding=&#8220;46px||100px||false|true&#8220; custom_padding_tablet=&#8220;|5%||5%|false|true&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/USB_Attack_DE-scaled.webp&#8220; alt=&#8220;USB_Attack_DE&#8220; title_text=&#8220;USB_Attack_DE&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Simulation eines Angriffs mit USB-Stick<\/h2>\n<p data-start=\"236\" data-end=\"290\">Fortgeschrittenes Training mit Simulation von USB-Angriffen<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Es erm\u00f6glicht die Simulation eines klassischen Angriffs mittels USB-Stick, einem der heimt\u00fcckischsten Kan\u00e4le f\u00fcr die Verbreitung von Malware und die Kompromittierung von Unternehmensnetzwerken. Diese scheinbar harmlosen Ger\u00e4te k\u00f6nnen tats\u00e4chlich dazu verwendet werden, sensible Daten zu stehlen oder b\u00f6sartigen Code zu installieren, insbesondere wenn sie ohne die erforderlichen \u00dcberpr\u00fcfungen angeschlossen werden.  <\/span><span style=\"color: #000000;\">Ziel ist es, die Mitarbeiter f\u00fcr die Bedeutung eines bewussten Umgangs mit externen Ger\u00e4ten und f\u00fcr die Einhaltung der Unternehmensrichtlinien, die deren Verwendung regeln, zu sensibilisieren. Dank der Erweiterung f\u00fcr den USB-Angriff k\u00f6nnen Supervisoren: <\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><strong>einen USB-Stick mit einer \u201eb\u00f6sartigen\u201c Microsoft Word-Datei, die ein Makro enth\u00e4lt, zu erstellen<\/strong><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||26px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><strong>jede Datei\u00f6ffnung \u00fcber das Remediation Dashboard zu \u00fcberwachen<\/strong><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><strong>die Anzahl der Benutzer zu \u00fcberwachen, die den USB-Stick nur angeschlossen und diejenigen, die auch das Makro aktiviert haben<\/strong><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f1f1f1&#8243; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;715px&#8220; custom_margin=&#8220;21px|auto||auto||&#8220; custom_padding=&#8220;0px|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_padding_tablet=&#8220;|8%|||false|false&#8220; custom_padding_phone=&#8220;|2%||2%|false|true&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;20px||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Simulation eines Angriffs mit QR-Code<\/h2>\n<p data-start=\"236\" data-end=\"290\">QR-Code und Phishing: Zielgerichtetes Training<\/p>\n<p>[\/et_pb_text][dipl_button _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/dipl_button][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Durch die Verwendung dieser speziellen Simulationsart wird es m\u00f6glich sein, das Anti-Phishing-Training zu erweitern und das Personal \u00fcber die Risiken zu schulen, die sich hinter einem b\u00f6sartigen QR-Code verbergen k\u00f6nnten. <\/span><span style=\"color: #000000;\">QR-Codes, die oft als harmlos wahrgenommen und leichtfertig verwendet werden, k\u00f6nnen tats\u00e4chlich auf betr\u00fcgerische Websites umleiten, unerw\u00fcnschte Downloads starten oder mobile Ger\u00e4te kompromittieren. <\/span><\/p>\n<p><span style=\"color: #000000;\">Die Sensibilisierung der Mitarbeiter f\u00fcr einen kritischen Umgang mit diesen Tools ist unerl\u00e4sslich, um die Exposition gegen\u00fcber immer ausgefeilteren Cyber-Bedrohungen zu reduzieren. <\/span><span style=\"color: #000000;\">Supervisoren k\u00f6nnen \u201eb\u00f6sartige\u201c QR-Codes generieren, die auf zwei verschiedene Arten verwendet werden k\u00f6nnen:<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Papierformat<\/strong>: Die Codes k\u00f6nnen ausgedruckt und an strategischen Stellen am Arbeitsplatz platziert werden. Nach dem Scannen k\u00f6nnen die vom Benutzer durchgef\u00fchrten Aktionen, wie das \u00d6ffnen von Links oder die Eingabe pers\u00f6nlicher Daten, \u00fcberwacht werden. <\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||12px|||&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>per E-Mail<\/strong>: Die QR-Codes k\u00f6nnen in Phishing-Simulationen integriert werden, die per E-Mail versendet werden, und bieten so ein weiteres realistisches und kontextualisiertes Angriffsszenario.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/QR_Code_Attack_DE_Mockup.webp&#8220; alt=&#8220;QR_Code_Attack_DE_Mockup&#8220; title_text=&#8220;QR_Code_Attack_DE_Mockup&#8220; align=&#8220;center&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_padding=&#8220;46px||100px||false|true&#8220; custom_padding_tablet=&#8220;|5%||5%|false|true&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/Adaptive-Remediation_DE-scaled.webp&#8220; alt=&#8220;Adaptive Remediation_DE&#8220; title_text=&#8220;Adaptive Remediation_DE&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Adaptive Learning Remediation<\/h2>\n<p data-start=\"236\" data-end=\"290\">Aus Fehlern lernen: Ma\u00dfgeschneidertes Training<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Die Adaptive Learning Remediation bietet einen personalisierten Schulungspfad f\u00fcr Benutzer, die sich w\u00e4hrend der Phishing-Simulationen als anf\u00e4llig erwiesen haben.<\/span><br \/><span style=\"color: #000000;\">Dank der aus dem <strong>Remediation Dashboard<\/strong> gesammelten Daten k\u00f6nnen Supervisoren gezielte Inhalte basierend auf beobachteten Verhaltensweisen zuweisen, wodurch das Bewusstsein genau an den kritischsten Stellen gest\u00e4rkt wird.<\/span><\/p>\n<p><span style=\"color: #000000;\">Die Schulung ist somit relevanter, effektiver und auf die tats\u00e4chlichen Bed\u00fcrfnisse jedes Benutzers zugeschnitten.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr erfahren&#8220; title_text=&#8220;Mehr erfahren&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|20px|0px|20px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;1px&#8220; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/de\/kontakt\/&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;KONTAKTIEREN SIE UNS&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ5NDg0In19@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DATENBLATT&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;off|desktop&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;M\u00f6chten Sie mehr wissen?&#8220; title_text=&#8220;M\u00f6chten Sie mehr wissen?&#8220; align=&#8220;right&#8220; disabled_on=&#8220;on|off|off&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PhishProTrainingsplattform \/ PhishProFortgeschrittenes Anti-Phishing-TrainingIm neuen Szenario der Cyber-Bedrohungen bleibt Phishing einer der am weitesten verbreiteten und heimt\u00fcckischsten Angriffsvektoren. Die Techniken entwickeln sich schnell weiter, werden immer ausgefeilter und \u00fcberzeugender und verbreiten sich \u00fcber immer vielf\u00e4ltigere Kan\u00e4le, wie Deepfake-Videos, QR-Codes und USB-Ger\u00e4te. Cyber Guru PhishPro ist die fortschrittliche Erweiterung des Cyber Guru Phishing-Programms, die entwickelt wurde, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-49809","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PhishPro: Fortgeschrittenes Anti-Phishing-Training - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/phishpro\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhishPro\" \/>\n<meta property=\"og:description\" content=\"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/phishpro\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T13:30:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"27\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishpro\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishpro\\\/\",\"name\":\"PhishPro: Fortgeschrittenes Anti-Phishing-Training - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2025-07-07T13:38:24+00:00\",\"dateModified\":\"2025-09-01T13:30:03+00:00\",\"description\":\"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishpro\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishpro\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishpro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PhishPro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhishPro: Fortgeschrittenes Anti-Phishing-Training - Cyber Guru","description":"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/phishpro\/","og_locale":"de_DE","og_type":"article","og_title":"PhishPro","og_description":"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.","og_url":"https:\/\/www.cyberguru.it\/de\/phishpro\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-09-01T13:30:03+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"27\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/phishpro\/","url":"https:\/\/www.cyberguru.it\/de\/phishpro\/","name":"PhishPro: Fortgeschrittenes Anti-Phishing-Training - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2025-07-07T13:38:24+00:00","dateModified":"2025-09-01T13:30:03+00:00","description":"Entdecken Sie PhishPro, das fortschrittliche Add-on f\u00fcr Anti-Phishing-Schulungen mit realistischen Simulationen und personalisiertem Lernen.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/phishpro\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/phishpro\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/phishpro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"PhishPro"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=49809"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49809\/revisions"}],"predecessor-version":[{"id":49947,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49809\/revisions\/49947"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=49809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}