Second Season
Cybersecurity Breaking News

Channel Training / Second Season Episodes

Channel Episode 2.1

ALL CRAZY ABOUT DISCOUNTS / WATERING HOLE
In this episode, we analyse once again a cyber attack technique borrowed from nature: the watering hole technique. The attacker, like a crocodile, waits for his victim.

Channel Episode 2.2

SUCCESSFUL FISHING / WHATSAPP SCAM
In this episode, we narrate a scam which targets a “technologically unprepared” executive. It is a scam based on psychological manipulation in which the hacker, disguised behind a false identity, succeeds in his criminal intentions.

Channel Episode 2.3

CALLING OUT / VISHING & DATA THEFT
We are increasingly accustomed to receiving calls from operators who inform us of unilateral changes to the contracts we have entered into. The perception of risk in these phone calls has decreased to the point of providing sensitive credit card data.

Channel Episode 2.4

“DANGEROUS” CAR PARKS / QUISHING
In this episode we explore a recently spread scam, which relies on an increasingly used code: the QR code. The basic deceptive mechanism is the same as that used for phishing: convincing the potential victim to take an action.

Channel Episode 2.5

TRY, BUT DON’T FORGET / FAKE WEBSITE
Distinguishing the true from the false in the digital dimension can be a really difficult exercise. The danger of becoming the designated victims of cybercriminals is always real. How can we protect ourselves? By engaging in virtuous digital behaviours.

Channel Episode 2.6

COPY WITH TOO MUCH KNOWLEDGE / CEO FRAUD
Compromising corporate accounts and infiltrating corporate email is the threat that cybercriminals use to make executives’ worst nightmares come true, especially when the intruders know perfectly well how to disguise themselves.

Channel Episode 2.7

PHOTO SOUVENIR… TO FORGET / DATA PROTECTION
Nowadays, the ease with which we share data and information can generate very critical situations for our Privacy. Following some simple behavioural precautions, however, can protect us against “indiscreet” sharing.

Channel Episode 2.8

THE EMAIL WAS CRITICAL / SPEAR PHISHING
Phishing is a cyber-attack technique that can take different forms depending on the context. Spear Phishing attacks, such as the one narrated in this episode, are generally more accurate, but hardly “perfect”.

Channel Episode 2.9

BEYOND APPEARANCES / FAKE NEWS
This episode explores in greater depth the threat hidden behind fake news, which now runs amok, undisturbed on the web. Before believing a sensational piece of news found on the web, we must subject it to an accurate X-ray.

Channel Episode 2.10

A “WRONG” DONATION / PHARMING
This episode highlights a particularly sneaky attack technique, which in the creativity of Cybersecurity specialists has taken on a special name: Pharming, the cloned site technique. But what is Pharming?

Channel Episode 2.11

DANGEROUS POSTS / PRIVACY
In the age of social media sharing, does privacy still exist? This episode tells the story of a candidate who was “rejected” from a selection, due to a post published on his social media profiles. A warning for young people, but also for the older ones.

Channel Episode 2.12

A VERY “EXPENSIVE” HOLIDAY / SHARED DEVICES
The essence of this story is the importance that our devices have taken on, both in the private and professional spheres. That’s why we have to be very careful about how we use these tools.

More

Want to know more?

Want to know more?

News

We’re proud to share that Cyber Guru has ranked #73 in TIME magazine’s 2025 list of the World’s Top EdTech Companies, created in collaboration with global market research firm Statista.

AWARENESS TRAINING

  • Awareness

    Continuous training to build knowledge and awareness

  • Channel

    An engaging training experience in TV series format

  • Chatbot NEW

    Conversational mode for workplace training

COMPLIANCE TRAINING

PHISHING TRAINING

  • Phishing

    Personalized adaptive training

  • PhishPro

    The add-on for advanced training

REAL TIME AWARENESS

Cyber Advisor NEW

GenAI cybersecurity assistant Discover Guru, the AI assistant specialized in cybersecurity!

FEATURED RESOURCE

Ebook

Cyber Guru Academy Content Creators

Content that makes a difference Conceiving, designing, and producing training content that generates interest, engagement, and motivation to learn is a daily challenge for Cyber Guru's Academy department. Because it is now clear that training people to defend themselves against cybercrime requires more than just an attractive platform and a multitude of content.