June 30, 2025
🏆 Security Awareness Leaderboard
ntroducing our new Leaderboard - see how your cybersecurity awareness stacks up against your colleagues. Gamify your security training and compete with your teammates to become the top security champion.
See your current ranking among all learners in your organization
View the top performers and their scores
Track your position as you complete training and improve your security practices
Real-time updates as you and your colleagues progress

📊 Aware Score
Introducing your personalized Aware Score - a comprehensive measure of your cybersecurity readiness! This score takes into account:
✅ Training episodes completed
🎣 Phishing simulation reporting accuracy
🔐 Multi-factor authentication (MFA) setup status
📈 Additional security behaviors (more coming soon!)
June 27, 2025
🌐 Dark Web Status Monitoring
We're now monitoring the dark web to help protect your personal information! Your new Dark Web status appears in the top right of your dashboard, giving you real-time visibility into whether your data has been found in known data breaches.
How it works:
We continuously scan dark web sources for both your personal and work email addresses
Add as many email addresses as you'd like for comprehensive monitoring
Your status shows as "Good" when no compromised data is detected across all monitored emails
Get immediate alerts if any of your email addresses appear in new breaches
Take proactive steps to secure your accounts before criminals can exploit your data
May 26, 2025
New Help Desk Impersonation Training Module
We're excited to announce the launch of our new "Help Desk Impersonation Defense" training module, designed to help your team identify and respond to fraudulent technical support calls targeting businesses.
What's New
Interactive Voice Simulation
Experience a realistic simulated call with a fake "help desk technician" using advanced text-to-speech technology
Engage in a conversation that demonstrates social engineering techniques used by scammers
Learn to identify warning signs in real-time during a simulated attack scenario
Scenario Details
Focused on fraudulent help desk calls where attackers pose as technical support staff
Simulates attempts to trick employees into downloading suspicious software or providing system access
Demonstrates how attackers use urgency tactics and technical jargon to appear legitimate
Shows how scammers exploit trust in IT support processes
Educational Components
Pre-simulation briefing explaining training objectives and legal compliance
Interactive decision points throughout the conversation
Post-simulation analysis highlighting key warning signs and proper escalation procedures
Detailed breakdown of psychological manipulation tactics and defensive strategies
Why This Training Matters
Fraudulent technical support calls remain a significant threat vector:
Help desk impersonation attacks have increased significantly in recent years
These attacks often target credential theft and unauthorized system access
Proper recognition training significantly reduces successful attack rates
Implementation
Modules are automatically assigned through the security awareness training platform
Employees receive clear notification they are entering a training simulation
Interactive scenarios guide learners through realistic defensive responses
Performance analytics and completion tracking available in admin dashboard
May 14, 2025
Interactive Voice Simulation
Experience a realistic simulated call with "from IT Security" using advanced text-to-speech technology
Engage in a realistic conversation that demonstrates actual social engineering techniques used by threat actors
Learn to identify red flags in real-time during a simulated attack scenario
Scenario Details
Focused on the common "fake IT support" tactic where attackers pose as internal IT staff
Simulates an attempt to trick employees into installing remote access software (LogMeInRescue)
Demonstrates how attackers leverage known company information (names, emails, manager relationships) to build false credibility
Educational Components
Pre-simulation briefing explaining the training objectives
Interactive decision points throughout the conversation
Post-simulation breakdown highlighting key warning signs and proper response protocols
Detailed explanation of the technical and psychological tactics demonstrated
Why This Matters
Remote access scams continue to be one of the most successful attack vectors for threat actors targeting businesses. According to recent data:
Over 65% of successful breaches involve some form of social engineering
IT impersonation attacks have increased 43% in the past year
The average cost of a successful remote access breach exceeds $1.2M
How To Use This reel
Reels are automatically assigned to learners through the security awareness training platform
Employees will receive clear notification that they are entering a training simulation
The interactive voice conversation will guide them through the experience
Performance metrics and learning assessments will be available in your admin dashboard
May 10, 2025
Change log now available
Changelog
added
Welcome to Kinds Security Changelog! This is where you can hear about the latest and greatest improvements.
