04/07/2025 BullPhish ID release notes v2.121

New feature

Optimized business reports

To help ensure the readability and efficiency of monthly and quarterly business reports, new versions of Section 3 and Section 5 will be generated based on the criteria outlined below.

In Section 3, the version included in the report is based on the number of target actions and the number of kits within the report period.

Section 3 versions:

  • Phished Users: When there are 100 target actions or less, the data is presented for each target.

  • Phishing Kits by Risk Level: When there are more than 100 target actions AND 150 kits or less, the data is summarized based on phishing kits. This version prevents overly long business reports from being generated.

    If there are more  than 100 target actions AND more than 150 kits, a note indicates that the maximum of 150 kits is being displayed.

In Section 5, the version included in the report is based on the number of target actions and the number of courses within the report period.

Section 5 versions:

  • Users by Risk Level: When there are 100 target actions or less, the data is presented for each target.
  • Training Courses by Risk Level: When there are more than 100 target actions AND 150 courses or less, the data is summarized based on training courses, preventing overly long business reports from being generated.

    If there are more than 100 target actions AND more than 150 training courses, a note indicates that the maximum of 150 courses is being displayed.

For more information about the specific data included in each version, see the article Business reports and user reports.

Content updates

New training courses

The following new training courses are now available in the Training portal:

  • What is PHI/ePHI? Learn what PHI entails and how the transition to electronic PHI, or ePHI, impacts you.
  • Introduction to Mobile Security: Learn about mobile device security and how to apply safe practices.
  • Mobile Security - Mobile Storage: The importance of mobile device storage and the different methods available are explored.

The following training courses have been updated:

  • GDPR Rights of Data Subjects Stored Processed Destroyed: Learn about the rights of data subjects under GDPR and how to remain compliant with the rules that govern the way data is stored, processed and destroyed.
  • EU GDPR: Important Definitions: Important General Data Protection Regulation (GDPR) definitions are examined.

Translated training courses

The following translated training courses are now available in the Training portal:

Course: English Portuguese French Spanish Dutch
Choosing Strong MFA Second Factors Escolhendo Os Segundos Fatores Fortes De MFA VO Choisir Des Deuxièmes Facteurs Forts Pour L’AMF VO Elegir Segundos Factores De AMF Potentes VO  
Spotting and Reporting Phishing Identificar E Denunciar Phishing VO Repérage Et Signalement D’hameçonnage VO Cómo Detectar Y Denunciar El Phishing VO  
Pretexting Pretexto VO Soutirage D’informations Confidentielles VO Pretexting VO  
Smishing and Vishing Smishing e Vishing VO Hameçonnage Par Message Texte Et Hameçonnage Vocal VO Smishing Y Vishing VO  
Intro to Social Engineering Noções De Engenharia Social VO Introduction Au Piratage Psychologique VO Bases De Ingeniería VO  
Baiting Isca VO Appâtage VO Cebo VO  
Tailgaiting and Piggybacking Tailgating e Piggybacking VO Passage En Double Et Accès À Califourchon VO Tailgating y Piggybacking VO  
Business Email Compromise Violação De E-mail Corporativo VO      
What is an Insider Threat Que É Uma Ameaça Interna? Qu’est-ce Qu’une Menace Interne? VO    
SIM Card Swap Scam GOLPE DE TROCA DE CHIP ESCROQUERIE PAR ÉCHANGE DE CARTE SIM ESTAFA DE CAMBIO DE TARJETA SIM BEDROG MET VERWISSELING VAN SIM-KAART
GDPR: GDPR for Data Breach notification For Processors: Organization’s Next Steps Regulamento geral de proteção de dados da UE para notificação de violação de dados por processadores: Próximos passos da organização RGPD de l’UE pour l’Avis d’atteinte à la protection des données des sous-traitants : Prochaines étapes de l’organisation GDPR de la UE para la notificación de violación de datos para procesadores: Próximos pasos de la organización EU AVG voor kennisgeving van gegevensinbreuk voor verwerkers: volgende stappen van de organisatie
GDPR for data processors GDPR aplicado a processadores de dados RGPD pour les sous-traitants des données GDPR para procesadores de datos AVG voor gegevensverwerkers
UK GDPR vs EU GDPR GDPR no Reino Unido vs GDPR na União Europeia RGPD du R.-U. c. RGPD de l’UE GDPR del Reino Unido frente al GDPR de la UE Britse AVG vs EU AVG
EU GDPR: What is GDPR? O QUE É GDPR? QU’EST-CE QUE LE RGPD? ¿QUÉ ES EL GDPR? Wat is de AVG?