Stay Ahead

Didn’t find the answer you were looking for? Our team is here to provide tailored insights, examples from real-world simulations, and compliance guidance for your industry.

Talk to a security expert →

Core Concepts & Threat Landscape

1. What is social engineering, and why is it still the #1 cyber threat?

Social engineering is the manipulation of people into revealing sensitive information, clicking malicious links, or granting unauthorized access - without hacking systems, but by exploiting human psychology.

Attackers bypass technology by targeting human instincts such as trust, urgency, and authority. This is why over 95% of data breaches involve human error.

2. Why do breaches still happen even with strong firewalls and antivirus?

Technical tools defend against known digital threats, but they cannot stop:
- Clicking on a realistic phishing link
- Trusting a spoofed email from a “CEO”
- Sharing credentials on a fake login page

Continuous human-layer security training is essential to close this gap.

3. What are the most common phishing tactics targeting enterprises today?

Modern phishing attacks are highly targeted and harder to detect. Common methods include:
- AI-powered spear phishing: Hyper-personalized emails based on OSINT.
- Adversary-in-the-Middle (AITM): Intercepting logins & MFA tokens in real time.
- Business Email Compromise (BEC): Impersonating executives to request payments or data.

4. How does OSINT make phishing attacks more effective?

Open-Source Intelligence (OSINT) is public data, from LinkedIn to press releases, that attackers use to:
- Personalize phishing messages
- Create deepfake voice calls using real dataSpoof vendor invoices with credible details

revel8 uses OSINT in reverse: To simulate realistic attacks based on your measured OSINT risk profile.

Training Philosophy & Effectiveness

5. How does revel8 prevent simulation fatigue?

We use adaptive playlists and gamified leaderboards:
- Content evolves in difficulty over time
- Scenarios avoid repetition
- Engagement and reporting rates improve month over month

Some employees may ignore simulations at first, but they become more attentive over time, as shown by rising reporting rates. Our playlists adapt to each person's security awareness level, giving well-trained employees fewer but more challenging simulations.

6. Does revel8 include e-learning courses?

Yes. We blend:
- Instant micro-training after failed simulations
- AI-powered training avatars
- Customizable e-learning academy
which consist of an extensive module library tailored to roles, risks, and compliance needs
- Admins can easily create new coursework based on pre-existing templates, via AI or from scratch

Simulations & Attack Types

7. Which attack channels does revel8 simulate?

We cover all major phishing vectors:
- Email phishing
- SMS/text (smishing)
- Deepfake voice calls
- Voice phishing (vishing)
- Video meeting invites
- QR code baiting
- Credential harvesting
- Spambombing

If we don’t have a specific attack type you need - we build it within 24 hours.

8. Can I customize simulations for my industry or vendors?

Yes. You can:
- Upload your own phishing templates
- Request supply-chain or BEC simulations that mimic real vendor threats
- Use “Emergency Mode” to launch immediate, scenario-specific simulations during active threats

Setup & Integrations

9. How much effort is required to start?

Almost none. revel8:
- Automates playlist creation & scheduling
- Offers a live dashboard to monitor progress

To get started, revel8 offers two ways to upload user information: You can either upload a CSV file in your admin center or integrate directly with most SCIM solutions (e.g., Microsoft Entra ID) & LDAP to sync the information for the relevant user groups.

10. Can revel8 integrate with my SIEM, SOAR, or SOC tools?

Yes. Our Awareness Monitor helps track KPIs, and reported phishing emails can automatically feed into your SOC workflow.

Compliance & Reporting

11. How does revel8 help with GDPR, NIS2, and ISO 27001 compliance?

We provide:
- Audit-ready logs of every simulation, lesson, and user action
- Benchmarks via our Human Firewall Index®
- Configurable data aggregation to protect privacy while measuring performance
- SIEM-ready exports for real-time compliance monitoring

12. Can I see individual employee performance?

By default, we report at the group level to meet GDPR. Individual reporting is possible with employee consent - often used for high-risk roles.

13. Which KPIs should security leaders track in revel8?

CISOs and security managers should focus on:
1. Awareness score: Aggregated performance indicator
2. Reporting rate: % of phishing attempts reported
3. Interaction rate: Fewer risky interactions over time
4. Ignore rate: Threats ignored or missed
5. Engagement trends: Team participation patterns

This FAQ was last updated on August 14, 2025.
Trusted by 100+ leaders
across different industries

Get your team deepfake ready

Discover how a deepfake cyber attack on your company could look like.

Get Demo