08/28/2023 BullPhish ID Release Notes v2.85

New Features

Automatic User Creation

After you have enabled KaseyaOne Unified Login and Automatic User Creation for your organization, your users in KaseyaOne who are granted access to the BullPhish ID module will automatically have a user created in BullPhish ID. The Automatic User Creation feature is available on the KaseyaOne tab on the organization's Settings page. 


With the Automatic User Creation feature, you can select a default access role that will automatically be assigned to newly created users. For user role information, refer to the BullPhish ID user roles article.

Important: The Enable Log In with KaseyaOne toggle must be activated before the Automatic User Creation feature can be enabled.

For more information about the Automatic User Creation feature, see the article Chapter 2.2: Enabling automatic user creation.


Issue 1: Training campaign invitations for campaigns created for the Pacific time zone were displaying the Eastern time zone instead for the course expiration date and time.

Fix: This issue has been resolved. Now, the course expiration date and time in the invitation:

  • reflects the timezone selected at the time of campaign creation.
  • displays the abbreviation of the time zone, if one exists (e.g., PST).

  • displays the full name of the time zone if an abbreviation does not exist (e.g., Warsaw/Poland) 


Issue 2: When using a custom domain in a phishing or training campaign, the campaign emails were failing the email spoofing test. The DNS records used to validate the custom domain were missing. 

Fix: The issue has been fixed so DNS records are now available when validating custom domains. Also, when you create a custom domain, bpid is assigned as the Value instead of the long character string. The fix applies to all previously created campaigns in the Scheduled or Processing Status and to all newly created campaigns going forward.

Old value

New value


New phishing kit

The new Netflix - Free Trial v2 phishing kit is now available. The email template and landing page are displayed below.

New phishing kit landing page

A new landing page is now available in English for use when creating a custom phishing kit. The landing page is called OopsLandingPageWhen you use this landing page in your phishing kit, users will be taken to this OopsLandingPage after clicking on the email. The step to take users to the credentials submission page will be skipped in the phishing kits using this landing page. Therefore, the Data Submitted status won't be tracked, but No Action, Emails Opened, and Links Clicked will be tracked.


The landing page includes guidelines for identifying phishing threats and a link to the course How to Avoid Phishing Scams. 

New training courses

New training courses are now available in the Training portal. For the courses available in different languages, see the table that follows the course descriptions.

  • Introduction to Protecting Credentials: In this course, learn simple practices you should follow that make it nearly impossible for cybercriminals to compromise your credentials.
  • Common Attack Types: Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the common phishing attack types.

Course names:

English course name Spanish course name French course name Portuguese course name German course name Dutch course

Introduction to Protecting Credentials






Introducción a la Protección de Credenciales VO




Introduction à la Protection des Identifiants





Introdução à Proteção de Credenciais






Einführung in den Schutz von Anmeldedaten





Inleiding tot het Beschermen van Toegangsgegevens






Common Attack Types









Tipos De Ataque Comunes








Types D’attaques Courantes








Tipos De Ataque Comuns








Häufige Angriffsarten









Veel Voorkomende Aanvallen









Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section