02/08/2024 BullPhish ID Release Notes v2.94


Sorting feature added to campaign log tables

The ability to sort data in the phishing campaign and training campaign log tables has been added. The Email Log (phishing campaigns) and the User Training Log (training campaigns) are found on each campaign's Details page. By default, the table data is listed alphabetically by the target’s first name in the Name column.

Data can be sorted using the following columns:

  • Name: Alphabetically by the target’s first name.
  • Email: Alphabetically by the first letter in the email address.
  • Status: Chronologically based on each target’s campaign status.
    • Phishing campaign statuses: Sent > Opened > Clicked Link > Submitted Data
    • Training campaign statuses: Sent > Opened > Opened Training > Completed Training

Email Log example

User Training Log

Content updates

Updated phishing kits

Updated phishing kits are now available. Each is listed below (links to updated kit) along with an image of its email template and landing page.

New training courses

New training courses are now available in the Training portal.

  • Business Email Compromise: Learn what a business email compromise attack is and examine the common tactics used in these attacks.


  • Choosing Strong MFA Second Factors: In this course, second factor techniques are examined and the accounts where you should enable MFA are described.


  • Common Attack Methods: In this course, you’ll examine the common phishing attack methods: pretexting, malicious links, and malicious attachments.


  • Creating Strong Passwords: Examine techniques for creating, maintaining, and managing strong passwords.


  • Dangers of Password Reuse: Examine how common and dangerous password reuse is and the reasons why users continue to reuse passwords.


  • Intro to Social Engineering: In this course, you will learn how social engineering attacks work, which will help you identify them in the future.


  • Pretexting: Learn about a specific type of social engineering attack known as a pretexting attack.


  • Spotting and Reporting Phishing: Learn how to spot phishing emails and examine why it is essential to report them.


Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section