08/28/2023 BullPhish ID Release Notes v2.85

New Features

Automatic User Creation

After you have enabled KaseyaOne Unified Login and Automatic User Creation for your organization, your users in KaseyaOne who are granted access to the BullPhish ID module will automatically have a user created in BullPhish ID. The Automatic User Creation feature is available on the KaseyaOne tab on the organization's Settings page. 

SSO16.png

With the Automatic User Creation feature, you can select a default access role that will automatically be assigned to newly created users. For user role information, refer to the BullPhish ID user roles article.

Important: The Enable Log In with KaseyaOne toggle must be activated before the Automatic User Creation feature can be enabled.

For more information about the Automatic User Creation feature, see the article Chapter 2.2: Enabling automatic user creation.

Fixes

Issue 1: Training campaign invitations for campaigns created for the Pacific time zone were displaying the Eastern time zone instead for the course expiration date and time.

Fix: This issue has been resolved. Now, the course expiration date and time in the invitation:

  • reflects the timezone selected at the time of campaign creation.
  • displays the abbreviation of the time zone, if one exists (e.g., PST).

  • displays the full name of the time zone if an abbreviation does not exist (e.g., Warsaw/Poland) 

R9.png 

Issue 2: When using a custom domain in a phishing or training campaign, the campaign emails were failing the email spoofing test. The DNS records used to validate the custom domain were missing. 

Fix: The issue has been fixed so DNS records are now available when validating custom domains. Also, when you create a custom domain, bpid is assigned as the Value instead of the long character string. The fix applies to all previously created campaigns in the Scheduled or Processing Status and to all newly created campaigns going forward.

Old value
R1.png

New value

R2.png

New phishing kit

The new Netflix - Free Trial v2 phishing kit is now available. The email template and landing page are displayed below.
R11.png

New phishing kit landing page

A new landing page is now available in English for use when creating a custom phishing kit. The landing page is called OopsLandingPageWhen you use this landing page in your phishing kit, users will be taken to this OopsLandingPage after clicking on the email. The step to take users to the credentials submission page will be skipped in the phishing kits using this landing page. Therefore, the Data Submitted status won't be tracked, but No Action, Emails Opened, and Links Clicked will be tracked.

R7.png

The landing page includes guidelines for identifying phishing threats and a link to the course How to Avoid Phishing Scams. 
R8.png 

New training courses

New training courses are now available in the Training portal. For the courses available in different languages, see the table that follows the course descriptions.

  • Introduction to Protecting Credentials: In this course, learn simple practices you should follow that make it nearly impossible for cybercriminals to compromise your credentials.
    R5.png
  • Common Attack Types: Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the common phishing attack types.
    R6.png

Course names:

English course name Spanish course name French course name Portuguese course name German course name Dutch course
name

Introduction to Protecting Credentials

 

 

 

 

 

Introducción a la Protección de Credenciales VO

 

 

 

Introduction à la Protection des Identifiants

VO

 

 

 

Introdução à Proteção de Credenciais

VO

 

 

 

 

Einführung in den Schutz von Anmeldedaten

 

 

 

 

Inleiding tot het Beschermen van Toegangsgegevens

 

 

 

 

 

Common Attack Types

 

 

 

 

 

 

 

 

Tipos De Ataque Comunes

VO

 

 

 

 

 

 

Types D’attaques Courantes

VO

 

 

 

 

 

 

Tipos De Ataque Comuns

VO

 

 

 

 

 

 

Häufige Angriffsarten

 

 

 

 

 

 

 

 

Veel Voorkomende Aanvallen

 

 

 

 

 

 

 

 

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section