frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Cybersecurity training programs don't prevent phishing scams

https://today.ucsd.edu/story/cybersecurity-training-programs-dont-prevent-employees-from-falling-for-phishing-scams
51•divbzero•4h ago

Comments

httpsoverdns•2h ago
The part about sharing among other employees when an internal phishing test is active is intriguing to me. In my organization, when someone gets a phishing lure - they tell everyone around them to watch out for it. I wonder how this impacts success rates.
everdrive•2h ago
Phishing has a few basic conceptual problems which no one seems to want to address:

  - You don't need to really be "fooled" by phishing. Not in the real sense. You just need to be tired one morning and click without looking. Even if you know how to check for phishing, you might need to click on content from 10s to 100s of emails per day. Scale this out to 1 year, and even the most educated among us can fail due to an honest mistake which we otherwise could have prevented.

  - Part of the problem is just that a normal workflow is: receive email --> click on URL --> enter credentials into 3rd party website. ie, this is intentional and valid behavior for most white collar workers on a daily basis. This behavioral pattern is why phishing works, and in reality, email should not be a vector for this path. Until companies and technologies stop assuming this makes sense, phishing will continue to be successful.
nemomarx•2h ago
The fact that your employer might direct you to a URL that doesn't look like their normal domain (or through some kinda link shortener so you can't see it without clicking) for legitimate reasons basically undoes all security yeah. Why can't security teams focus on correcting those parts?
whydoyoucare•2h ago
The normal workflow is so ingrained in our company culture, that I received an email from our IT team about not clicking on embedded links, and that email had a embedded link to "learn more". ;-)
bee_rider•2h ago
Maybe that was a test.
whydoyoucare•1h ago
I thought so too, but no, it wasn't.
simonw•2h ago
These both seem like arguments for phishing-resistant auth methods to me (like passkeys).
bee_rider•2h ago
I’m somewhat surprised that enterprise email solutions still allow links… like, at all, in general.

The servers should scan emails for links and not allow them. If a link somehow slips through, the client should not render it as something you can click on and follow.

On work machines where everything is managed by IT, there shouldn’t be any need to send links around anyway. If anyone thinks they need to send a link around as an ongoing process, then that’s the sign that the process still needs to be designed.

everdrive•2h ago
>I’m somewhat surprised that enterprise email solutions still allow links… like, at all, in general.

Completely agreed, and I think it's telling that so few email clients or webmail services actually allow you to always render as plain text.

misterprime•1h ago
This sounds quite short sighted to me. You can’t imagine needing links being sent in everyday workflow at the office, yet I can’t imagine not using links in emails.

How would people interact with vendors and salespeople that send links to product specs, troubleshooting articles, etc?

bee_rider•1h ago
If it is a vendor you are buying hardware from, they could send a part number, for example. The workflow should be go to their site, and search it up.

I don’t think it is short sited. Actually, I think if it has a flaw it is the opposite one. Workflows that involve mailing around links are convenient for quick little in-the-moment thrown together actions. It’s liberating. I’ve done it too, sure. But, in the long run everything should be integrated somehow or another and sending links should not be necessary. One might say it is ridiculous to expect every process to reach that end state. Possibly true, but it is a good goal…

billy99k•1h ago
I don't click on any urls from email. This should be the standard.
jasode•1h ago
> - Part of the problem is just that a normal workflow is: receive email --> click on URL --> enter credentials into 3rd party website. ie, this is intentional and valid behavior for most white collar workers on a daily basis.

Here's a crazy history of that happening...

I had a friend who was an employee of a Fortune 100 corporation. Part of employee training was not to click on links in emails. In the 1990s and the rise of the internet, they had an internal security "red team" periodically send a fake phishing emails to employees. If the employee mistakenly clicked on a link in that email, the red team would send a notice to the employee's manager. It worked well because employees would not want to be embarrassed by a manager having to review the security policy with them to get their access back.

When she retired, all that training became useless and she was phished by a fake AT&T email. Why? Because with the rise of smartphones, every _legitimate_ company started sending emails that had useful tappable links. With the touchscreen, you can't hover your finger over the link to see what the underlying url is. People just normalize pressing on links in transactional emails as a convenient thing to do. E.g. Amazon sends an email with a link to the order status. A legit bank will send an email with a link for "Please review your security setting."

Smartphones reversed 15 years of not clicking on email links.

chasil•1h ago
Exchange ought to have the capability of rewriting the links' hrefs to a "link gateway" where a sandboxed renderer presents the outside page, maybe running over rdp and purged after the end of every session.

The local Blink (or WebKit) renderer should be for internal or white listed sites only.

pixl97•47m ago
There are vendor solutions that do just this, converting all links to some kind of proxy service.
thewebguyd•1h ago
Re: the receive email -> click URL -> enter credentials.

We need SSO to stop being gated behind enterprise tiers. SSO tax is real, and can help solve this problem. I've moaned about this before as the leader of an IT team for a medium-sized company reliant on a lot of SaaS.

Enterprise plans are too much (both in terms of cost and features) for us, but we are smart enough to have security requirements and one of those is SSO & SCIM. Very few SaaS offers that on anything but the most expensive "call for quote" tiers. That's a huge problem.

That whole email invite->click link->enter credentials workflow is gone with proper SCIM provisioning and SSO. It's the bare minimum a SaaS product should offer and should be on the lowest available tier.

The other problem are services like DocuSign, which offer free trials that are abused to send out fake documents. User gets a legitimate email from DocuSign's domain, clicks on it, opens up a real document in the real DocuSign site, but the doc has a link to the phishing site.

All DocuSign needs to do is require a CC for the trial or contacting sales for a trial, problem solved. But they don't, so as far as I'm concerned they are complicit in enabling phishing.

noncoml•2h ago
You can tell if an email is from a training program just by looking at the email headers. I have a filter in outlook and those emails don’t even hit my inbox.
vkou•2h ago
It would behoove you to also check if the evil bit is set on all incoming packets.

https://www.rfc-editor.org/rfc/rfc3514

noncoml•45m ago
You are being sarcastic and imply I don’t know what I am telling without even asking for details, which is not appreciated.

In my previous company they literally had an X-PHISHING-ID header.

In my current company the phishing emails don’t have a single Received header.

nerdjon•2h ago
I have lost count of how many jobs train me specifically to look at the URL's in emails by hovering over them to confirm that it is legitimate.

And then put fucking mimecast infront of everything so I legit can't do what they are training me to do...

So yeah, the training is worthless and just there to tick a box.

olyjohn•2h ago
I had an exec at a tech company once send out an email with the subject line "Important." All there was, was an attached .docx file, and a sentence saying to read it immediately. This guy should have been fired for this level of incompetence. No, it wasn't a phishing test.

Then Microsoft sends out e-mail advertisements with fucking QR codes in them to everybody to get people to install software without IT department's knowledge. So you not only can't see the link, you can't even de-obfuscate it by hovering over it.

There's a really easy fix for this. It's so fucking easy it hurts my brain.

Disable HTML e-mails. Disable hyperlinks. Feel free to send URLs, but make people copy and paste the link. This way they have to at least select the link. When they get a 6000 character link and can't copy paste it? That's good! Because they have no idea what the link actually is.

Nobody will do it, and I don't get why not. Do you really need to market to your internal employees so badly with images and links? That's what a portal is for. Post updates on your portal and stop bombarding my goddamn email box.

josefritzishere•2h ago
I received an email this week which read at the top in red text "THIS IS NOT A PHISHING EMAIL." I thought...isn't that exactly what a phishing email would say?
freehorse•1h ago
Was it?
Calamitous•2h ago
The only anti-phishing program I've ever seen that was even a little effective was at one company I worked at, where there was an ongoing phishing test.

Users were randomly selected to get the test, and each phish was hand-crafted to trick people specifically at our company (but using only publicly available information). Anonymized results were posted quarterly, divided by department.

I only got fooled once, but man, it felt so bad to see Engineering show up on the dashboard with one hit that quarter.

(Sales was usually at the top of the list, which makes sense, since they interface with a lot of folks outside the org)

bee_rider•2h ago
Although, why limit it to publicly available information? Security is an onion. If somebody gets access to internal documentation, HR lists, etc, the organization should still be resistant to their phishes.
thewebguyd•1h ago
> If somebody gets access to internal documentation, HR lists, etc,

It's hard to be resistant to phishing at that point and you have bigger problems.

What if Susan in HR falls victim to token theft (let's say conditional access/MDM policies don't catch it or aren't configured, which many businesses don't bother with). Her email account is now pwned, and the company gets an email from her, it passes all verification checks because it's actually from her account.

It's still phishing, but the users have no way to know that. They don't know Susan just got compromised and the email they got from her isn't real. If this is a human attacker and not just bots, they can really target the attack based on the info in her inbox/past emails and anything else she has access to.

So there's no way for the organization to be resistant at that point until IT/security can see thea account compromise and stop it. Ideally, it's real-time and there's an SOC ready to respond. In practice, most companies don't invest that much into security, or they are too small and don't have the budget for a huge security operation like that.

It's a really hard problem to solve

bee_rider•1h ago
HR shouldn’t be sending links anyway. They should send instructions: go to the portal (on your corporate controlled laptop, so this could be your new tab page) click on the paystubs link, blah blah.

Somebody in every big company is compromised already.

themafia•1h ago
We got hit in a similar way. They didn't use HR's account to email but they grabbed the mobile phone numbers of everyone in the directory. They then started a text message campaign, pretending to be our CEO, demanding that employees go to Target and buy gift cards on behalf of a client.

One person actually did fall for it but decided to physically bring the cards to the CEOs office. Thankfully that exposed the attack and effectively halted any damage done.

These criminals are relatively clever.

spogbiper•37m ago
i've noticed the gift card stands at Target and other stores around here now have a sign stating "If you received a text from your boss telling you to buy gift cards, you are being scammed" or similar
serial_dev•1h ago
I’m assuming it’s the “easy” mode and they still have many successful phishing attempts, so it didn’t make sense to go to the next level if the company still fails in easy level.
tptacek•1h ago
These are exactly the kind of campaigns that studies show not to be effective (or even paradoxically ineffective). "Effective" doesn't mean "manages to successfully phish" (you'll always eventually be successful); it means reducing the likelihood that concerted attacks will be successful.

The actual response to phishing is to use authentication mechanisms that resist phishing.

whydoyoucare•2h ago
I always suspected technical tools were more effective (time, effort, money) than the training programs. However, only company-wide training programs provide visibility to the CISO, so they tend to be popular even if ineffective.

Because you cannot fix humans, technology is the most effective approach.

cosmicgadget•2h ago
> After sending 10 different types of phishing emails over the course of eight months, the researchers found that embedded phishing training only reduced the likelihood of clicking on a phishing link by 2%.

Company: Stop clicking on links to third party sites.

Also Company: All of IT, HR, benefits, cloud storage, customer management, and employee portal is moving to its own third party platform!

chrisweekly•1h ago
Yeah. Even worse(?) is banks like Citizens sending customers emails and text messages with links to shady-seeming domain names. No wonder so many people fall for phishing attacks.
foxglacier•2h ago
Seems like they counted it as a failure if the user just clicked the link in the email. But what are the supposed to do? Never click links in emails? Only click links to some white-list of domains they hold in their head? I would think clicking a link is fine, but entering credentials is not.

It's no surprise people didn't engage with training material on the pretend phishing site!! At that stage, they're told it was a trap and they shouldn't even be there so of course they're going to get out asap.

Msurrow•1h ago
Clicking a link can be more than enough to “get hacked”; you don’t always need to enter credentials. So yes, unfortunately the correct answer is either to have the whitelist of domains in your head (BUT this is also very risky due to homograph attacks [1]), or simply never click links in mails.

The secure thing to do is: Read mail that tells you to click link to whatever online tool you work with. Then instead of clicking link in mail you open a browser and manually visit the site the link was pointing to. If there is a message, notification, or something else that the emails wants you to look at, then it will also be there when you login “directly”.

1: https://en.wikipedia.org/wiki/IDN_homograph_attack

floxy•28m ago
>homograph attacks

Is there a good way (right now) to defend against this? I'm willing to live with a browser that only accepts ASCII in the address bar, and disables Unicode in email (replaced with �?)

ttGpN5Nde3pK•2h ago
Most companies would have a much easier time with phishing if they quit sending official correspondence that mimics phishing. Sure, phishing is always evolving to look legitimate, but C͟l͟i͟c͟k͟ h͟e͟r͟e͟!͟ in literally every official email when whatever it is you need to do _should_ be reachable via known links. All the "click here" 's and "please see attached" tricks would quit working if it wasn't normal.
thewebguyd•1h ago
I'm of the opinion that most (not all) email phishing can be solved if we all just collectively admitted that HTML email was a mistake, and go back to text based only and enforce that everywhere.

No more logos, no more masked links (you have to acutally copy and paste the text, giving you a chance to review the URL), no more QR code phishing, no more realistic looking but fake DocuSigns. Get rid of attachments while we are at it, there are other, better ways to share files within an office environment (because ultimately, if we enforce text only, then all phishing would then arrive via attachment in the form of a PDF or rich word doc with the fake logos and a clickable link).

ttGpN5Nde3pK•1h ago
I already disable images, but sign me up for text only email!
technion•1h ago
Ive argued for a while: the value of these programs is to solve the management problem.

When you propose a security solution, someone is going to say "oh my users are too smart to be phished, don't worry about this". Ive had this argument for rolling out mfa at nearly every company ive worked with.

Phishing tests give you the "well actually" data.

immibis•1h ago
It's not about preventing the phishing, it's about preventing the liability from the phishing. If someone can show you didn't follow cybersecurity training best practices, you may be liable for any failure of cybersecurity. Best way to prevent that is to follow the best practices, even if they don't work. A lot of things in the corporate world work this way.
fooey•1h ago
yep, it's all CYA checkbox busywork to send to insurance when something happens
Duanemclemore•46m ago
This was my comment as well. It doesn't mean they're -necessarily- going to throw the employee under the bus. But it does get them off the hook.
lapcat•1h ago
> Overall, 75% of users engaged with the embedded training materials for a minute or less. One-third immediately closed the embedded training page without engaging with the material at all.

To call this "training" is highly misleading.

It's no surprise that the mere existence of training materials does not help if nobody reads and studies the training materials.

They should preface the training materials with "$100,000 USD will be transferred to your bank account if you read this and successfully answer the questions at the end."

dang•1h ago
Recent and related:

Kurt Got Got - https://news.ycombinator.com/item?id=45520615 - Oct 2025 (216 comments)

tptacek•1h ago
Just rubbing it in, eh?
cycomanic•1h ago
The reason might be that the training programs are just ridiculously bad. I clicked on a pretend phishing link out of interest to see what happens. I was treated to a lecture of how clicking on links in emails is always bad and to never do it.

That advise would be fine (albeit maybe extreme) if it wasn't the case that for the last year I have been spammed by emails from said training company telling me to click on the included link to complete the next cybersecurity course. Even worse they use some nondescriptive weirdly named domain not their own to host the training courses. So if anything the courses are training people to click on phishing emails.

themafia•1h ago
I recently got reported for clicking a phishing link three times. Looking at the audit log all three of these clicks supposedly happened within seconds of each other.

My suspicion is the training company realized no one was falling for the obvious bait anymore and they needed to gin up the numbers to keep the company convinced that paying for their services was worthwhile.

Meanwhile all corporate teams use the same VLAN and DHCP Address Pool. There is zero separation of departments on the network. A lot of companies get this precise situation backwards as we have.

lesuorac•37m ago
I wonder if it's your email client or something.

IIUC, some of them will pre-load a page by opening it for you.

lozenge•38m ago
Your company should get a better company, mine either asks to download and run a file or presents a login form. I'm not sure what they do after that because I've never failed that badly...
sunrunner•1h ago
"Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams - Click Here to Find Out How to Really Protect Your Employees"
whydoyoucare•1h ago
A very straightforward technical solution is to convert all html emails to plain text (ASCII). Mutt users rarely get phished. :-)
agiacalone•1h ago
I think the conclusion of this article is slightly flawed. The issue isn't with engagement with the training (although, the typical corporate training material is pretty bad), rather how we go about teaching cybersecurity.

I take a page from Jayson E. Street's DefCon talk from a few years ago with my students: promote "Security Awareness", not Security Training. Get people to think about what is being asked of them and the consequences of said actions. People tend to take "Security Training" as "I need to remember A, B, C, etc." Humans are bad at this sort of thing, typically.

I admit that "Security Awareness" isn't all that easy, but clearly our current approaches leave much to be desired.

yabones•1h ago
It's a culture problem. The real solution is to teach people to trust their security department.

If there's trust and respect, they'll reach out without fear of reprisal and inform right away when there's a problem.

If there's a culture of punishment, they'll fear the IT gestapo and try to cover up mistakes that could cost them their job.

It really is that simple.

impure•1h ago
I looked at the paper. How it's being reported is highly misleading. There were 4 different active training groups. One of the groups benefitted from the training and one of the groups actually got worse. So as a whole phishing training only has a 2% boost. However the message is not that phishing training is useless, only that if applied incorrectly it is useless.
Duanemclemore•54m ago
The point of trainings is only secondarily to stop these things from happening. The goal is for the institution to avoid liability by transfer responsibility for their having happened to others.

Mystery of Prince Rupert's Drop at 130k FPS [video]

https://www.youtube.com/watch?v=xe-f4gokRBs
1•akshatjiwan•2m ago•0 comments

Show HN: An open-source framework for building "Apps in ChatGPT"

https://github.com/DooiLabs/Chat.js
1•zachpark•5m ago•0 comments

Robert Roberson: Death row inmate's execution halted by Texas CCA

https://www.cnn.com/2025/10/09/us/robert-roberson-execution-stay
1•rossant•5m ago•1 comments

The Burrows-Wheeler Transform

https://sandbox.bio/concepts/bwt
1•g0xA52A2A•6m ago•0 comments

Future of Work: How AI Is Reshaping Software Development

https://bignorthmarketing.com/blog/future-of-work-how-ai-is-reshaping-software-development
1•bignorthchris•8m ago•0 comments

Show HN: I Built a Hub for Infosec

https://pentestlist.com
1•MrTurvey•8m ago•1 comments

Which Cars Get Pooped on the Most? The Bird Dropping Report

https://alansfactoryoutlet.com/infographics/car-bird-droppings-report/
1•gnabgib•9m ago•1 comments

Nucleon Decays into Light New Particles in Neutrino Detectors

https://journals.aps.org/prl/abstract/10.1103/cxvm-p412
1•PaulHoule•9m ago•0 comments

Spoils System

https://en.wikipedia.org/wiki/Spoils_system
1•geox•9m ago•0 comments

Naked mole rat lifespan: A 30-year long mystery unraveled

https://www.science.org/doi/10.1126/science.adp5056
1•bilsbie•10m ago•0 comments

Faster and safer instant euro payments become a reality

https://ec.europa.eu/commission/presscorner/detail/en/ip_25_2321
4•raybb•12m ago•0 comments

Not Even Wrong: On the Limits of Prediction as Explanation in Cognitive Science

https://arxiv.org/abs/2510.03311
1•kjhughes•13m ago•1 comments

Signs That You Don't Understand Obesity

https://www.exfatloss.com/p/signs-that-you-dont-understand-obesity
3•paulpauper•15m ago•0 comments

Yo-Yo Theory: Up and Down Clears the PUFAs

https://theheartattackdiet.substack.com/p/yo-yo-theory
1•paulpauper•15m ago•0 comments

Code Is Never Neutral: Why All Software Is Political [video]

https://www.youtube.com/watch?v=Kpfff6TS018
1•todsacerdoti•18m ago•0 comments

Intel Fab 52 in Chandler Arizona Is Running 18A – ServeTheHome

https://www.servethehome.com/intel-fab-52-in-chandler-arizona-is-running-18a/
2•rbanffy•18m ago•2 comments

Show HN: Transcript-based video editor that runs 100% locally on Mac

https://apps.apple.com/us/app/scriptedit-video-editor/id6752915051?mt=12
2•zhendlin•18m ago•0 comments

More than 30% of this century's science Nobel prizewinners immigrated

https://www.nature.com/articles/d41586-025-03247-6
5•rntn•19m ago•0 comments

US anti-fascism expert blocked from flying to Spain at airport

https://www.theguardian.com/us-news/2025/oct/09/anti-fascism-mark-bray-rutgers-university
45•tastyface•22m ago•1 comments

Quantum Networks: Cisco Software Boosts Classical Tech

https://spectrum.ieee.org/quantum-networks-cisco-quantum-computing
1•rbanffy•22m ago•0 comments

Show HN: Go CLI to create instant PostgreSQL branches of your database

https://github.com/quicdb/quic
1•rafaelquicdb•22m ago•0 comments

We're about to find more interstellar interlopers

https://arstechnica.com/features/2025/10/were-about-to-find-many-more-interstellar-interlopers-he...
1•rbanffy•23m ago•0 comments

New York City Sues Social Media Companies over 'Youth Mental Health Crisis'

https://gizmodo.com/new-york-city-sues-social-media-companies-over-youth-mental-health-crisis-200...
2•mikece•24m ago•0 comments

RND1: Simple, Scalable AR-to-Diffusion Conversion

https://www.radicalnumerics.ai/blog/rnd1
1•ray__•25m ago•0 comments

A Lisp Interpreter for Linux Shell Scripting

https://www.jakobmaier.at/posts/lisp-interpreter/
2•gue-ni•28m ago•0 comments

New York City sues social media companies for allegedly addicting children

https://www.reuters.com/sustainability/boards-policy-regulation/new-york-city-sues-social-media-c...
2•1vuio0pswjnm7•30m ago•0 comments

A piece of computing history: The Acorn Archimedes A420/1

https://www.youtube.com/watch?v=zvv06jKcMtE
1•bane•31m ago•0 comments

Examples Are the Best Documentation

https://rakhim.exotext.com/examples-are-the-best-documentation
6•Bogdanp•32m ago•0 comments

The Stakes, and Real Story, of Peter Thiel's Antichrist Obsession

https://www.wired.com/story/the-real-stakes-real-story-peter-thiels-antichrist-obsession/
3•wolfcola•33m ago•0 comments

Pokémon Fans Suspected Fake Cards, One Found the Clue to Prove It

https://www.popularmechanics.com/culture/a65054664/pokemon-card-authentication-scam/
1•speckx•36m ago•0 comments