BullPhish ID December 31, 2025 content updates
Training courses
The following new training course is now available in the Training portal:
| Category | Title | Description |
|---|---|---|
| Compliance Regulations Education | Identifying Controlled Unclassified Information (CUI) | Controlled Unclassified Information, or CUI, is sensitive government data that isn’t classified but still must be protected. This course explains what CUI is, why it matters, how to recognize it, and what to do if you encounter it in your work. |
| Phishing | Calendar Phishing | Calendar invites can be weaponised by attackers to deliver phishing links, malware, or fake meeting requests. This course explains how calendar-based phishing works, why it’s growing, and what you can do to protect yourself and your organization. |
| Cyberthreat Education | Zero-Day Attacks: Introduction & Safety Practices | Zero-day vulnerabilities are software flaws discovered by attackers before developers can fix them. This course explains what zero-day threats are, why a rapid patch response matters, and how you can help your organization stay protected. |
The following updated training courses are now available in the Training portal:
| Category | Title | Description |
|---|---|---|
| Compliance Regulations Education |
Introduction to HIPAA |
Learn how to protect patient privacy and stay compliant with the Health Insurance Portability and Accountability Act (HIPAA). Understand what Protected Health Information (PHI) includes, why compliance matters, and how simple actions prevent costly data breaches. |
| Compliance Regulations Education | HIPAA: Overview of the Privacy Rule and Security Rule | The HIPAA Privacy Rule and Security Rule protect health information by setting clear standards for how it’s used, shared, and secured. This course explains each rule, how they work together, and how you can apply them to keep data private and safe. |
| Data Protection & Privacy | Data Protection: Data Encryption | As more data goes digital, increasingly rigorous security measures must be taken to prevent it from theft/manipulation. This course will go over one of the most important forms of data protection - data encryption. |
| Data Protection & Privacy | Data Protection: Secure Data Storage | Secure data storage means keeping information safe wherever it lives. This course explains what secure storage is, why it matters, and how you can protect data whether it is on your device, in the cloud, or on shared systems. |
| Data Protection & Privacy | Data Protection: Privacy Risks | Protecting personal data is about more than compliance — it’s about maintaining trust. This course explains what privacy risks are, why they matter for every employee, and how to recognize and prevent them before they become breaches. |
| Data Protection & Privacy | Data Protection: Secure Connections | A secure connection protects the information you send and receive online. This course explains what secure connections are, why they matter for protecting sensitive data, and how you can make sure your connections are safe—whether you’re in the office, at home, or on the go. |
| Data Protection & Privacy | Privacy and Data Classification | No matter what company or organization you work for, there will always be some form of private data that can only be accessed by certain personnel. In the video below, you will learn the nuances of Data Classification and Privacy in order to better understand their importance in keeping your business safe. |
The following translated* training courses are now available in the Training portal:
(*All French courses are titled in their native language.)
| Category | Title | Languages |
|---|---|---|
| Compliance Regulations Education | Understanding NIST 800-171 VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | NIST 800-171: Who is Required to Comply & What Information is Protected VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | NIST Incident Response VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | NIST AI RMF: Preventing Risks in AI Applications VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | Consequences of PHI Release VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness |
AI and Cybersecurity: Safe AI Tool Usage VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness |
The Dangers of AI-Generated Phishing VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | AI Deception: Recognizing Deepfake Scams VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | How to Defend Against Autonomous AI Threats VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Shadow AI Threats: Data Governance Failures and Security Risks VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Preventing AI Application Attacks VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | UK NCSC: Defending Against AI-Driven Cyber Threats VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Mobile Security: Defending Messaging Platforms VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Physical Security: Lock Screens VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Internet Safety and Social Media VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Clean Desk Policy VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Cyberthreat Education | Ransomware- Downloads and Attachments VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Cyberthreat Education | Token Theft: How Hackers Steal Your Digital Keys VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Cyberthreat Education | Malware Awareness VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Cyberthreat Education | Safe Web Browsing: Domain Spoofing & Website Forgery VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Phishing | Phishing: The Dangers of Malicious Attachments VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Data Protection & Privacy | Understanding Common Types of Data Breach VO | Dutch, French-Canadian, German, Portuguese, Spanish |