One platform to prevent GenAI social engineering

Everything you need to build and maintain a strong human firewall.
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo
Company logo

Everything you need to build & maintain a solid human firewall in one platform

A woman in front of her laptop.

Live Human Threat Intelligence

Boost awareness with real-world social engineering simulations.

An icon of a person.

OSINT Risk Profiling

Enrich your training with simulations based on your public risk profile.

AI Powered Attack Simulations

Increase your organization’s cyber resilience on autopilot.

Next-Gen Learning & Gamification

Boost cyber resilience with smart, targeted training on the spot.

Compliance & Reporting

Gain real-time insights into your human cybersecurity risk.

A woman in front of her laptop.

Live Human Threat Intelligence

Stay ahead of emerging social engineering tactics. Detect and simulate real-world attacks sourced from threat actor chatter, user reporting, and dark web patterns.

An icon of a person.

OSINT Risk Profiling

Attackers use public data to launch targeted attacks. Our OSINT Risk Profiler scans 400+ data points to reveal your company’s digital exposure and power realistic simulations, so your team trains against real threats.

AI-Powered Attack Simulations

Run realistic phishing, voice, and deepfake scenarios across multiple communication channels on autopilot to test employee responses to sophisticated threats.

Next-Gen Learning & Gamification

Deliver contextual security education in short lessons exactly when employees need it most, with gamified elements and our AI-Avatar that boost engagement.

Compliance & Reporting

Get real-time visibility into awareness, behavior, and improvement. Benchmark against peers and align with frameworks like NIS2 and ISO 27001.

Learn more about the platform
New

revel8 reporting app

Easy reporting of deepfake calls and social engineering attacks – right from your phone.

Real-time threat reporting

Empower employees to report suspicious calls, texts, or messages within seconds - directly via the mobile app. No delays, no tickets, just action.

Smart context capture

Each report auto-captures relevant metadata like call type, attack vector, and severity. Get the full picture, not just a screenshot.
iPhone mockup

Instant insights for IT

All submissions sync in real time with your revel8 dashboard, making it easy for security teams to triage and act fast.

Integrated learning feedback

Every report triggers a relevant micro-training, helping employees understand what just happened - and how to stay safer next time.

Get your team deepfake ready

Discover how a deepfake cyber attack on your company could look like.

Get Demo

Get involved

If you can't find the perfect answer to your question, please let us know. We are more than happy to provide more information and case examples on our solution.

Reach out to us →

Core Concepts & Threat Landscape

What is social engineering, and why is it still the #1 cyber threat?

Social engineering is the manipulation of people into revealing sensitive information, clicking malicious links, or granting unauthorized access - without hacking systems, but by exploiting human psychology.

Attackers bypass technology by targeting human instincts such as trust, urgency, and authority. This is why over 95% of data breaches involve human error.

Why do breaches still happen even with strong firewalls and antivirus?

Technical tools defend against known digital threats, but they cannot stop:
- Clicking on a realistic phishing link
- Trusting a spoofed email from a “CEO”
- Sharing credentials on a fake login page

Continuous human-layer security training is essential to close this gap.

What are the most common phishing tactics targeting enterprises today?

Plus icon

Modern phishing attacks are highly targeted and harder to detect. Common methods include:
- AI-powered spear phishing: Hyper-personalized emails based on OSINT.
- Adversary-in-the-Middle (AITM): Intercepting logins & MFA tokens in real time.
- Business Email Compromise (BEC): Impersonating executives to request payments or data.

How does OSINT make phishing attacks more effective?

Plus icon

Open-Source Intelligence (OSINT) is public data, from LinkedIn to press releases, that attackers use to:
- Personalize phishing messages
- Create deepfake voice calls using real dataSpoof vendor invoices with credible details

revel8 uses OSINT in reverse: To simulate realistic attacks based on your measured OSINT risk profile.

Training Philosophy & Effectiveness

How does revel8 prevent simulation fatigue?

Plus icon

We use adaptive playlists and gamified leaderboards:
- Content evolves in difficulty over time
- Scenarios avoid repetition
- Engagement and reporting rates improve month over month

Some employees may ignore simulations at first, but they become more attentive over time, as shown by rising reporting rates. Our playlists adapt to each person's security awareness level, giving well-trained employees fewer but more challenging simulations.

Does revel8 include e-learning courses?

Plus icon

Yes. We blend:
- Instant micro-training after failed simulations
- AI-powered training avatars
- Customizable e-learning academy
which consist of an extensive module library tailored to roles, risks, and compliance needs
- Admins can easily create new coursework based on pre-existing templates, via AI or from scratch

Simulations & Attack Types

Which attack channels does revel8 simulate?

We cover all major phishing vectors:
- Email phishing
- SMS/text (smishing)
- Deepfake voice calls
- Voice phishing (vishing)
- Video meeting invites
- QR code baiting
- Credential harvesting
- Spambombing

If we don’t have a specific attack type you need - we build it within 24 hours.

Can I customize simulations for my industry or vendors?

Yes. You can:
- Upload your own phishing templates
- Request supply-chain or BEC simulations that mimic real vendor threats
- Use “Emergency Mode” to launch immediate, scenario-specific simulations during active threats

Setup & Integrations

How much effort is required to start?

Almost none. revel8:
- Automates playlist creation & scheduling
- Offers a live dashboard to monitor progress

To get started, revel8 offers two ways to upload user information: You can either upload a CSV file in your admin center or integrate directly with most SCIM solutions (e.g., Microsoft Entra ID) & LDAP to sync the information for the relevant user groups.

Can revel8 integrate with my SIEM, SOAR, or SOC tools?

Yes. Our Awareness Monitor helps track KPIs, and reported phishing emails can automatically feed into your SOC workflow.

Compliance & Reporting

How does revel8 help with GDPR, NIS2, and ISO 27001 compliance?

We provide:
- Audit-ready logs of every simulation, lesson, and user action
- Benchmarks via our Human Firewall Index®
- Configurable data aggregation to protect privacy while measuring performance
- SIEM-ready exports for real-time compliance monitoring

Can I see individual employee performance?

By default, we report at the group level to meet GDPR. Individual reporting is possible with employee consent - often used for high-risk roles.

Which KPIs should security leaders track in revel8?

CISOs and security managers should focus on:
1. Awareness score: Aggregated performance indicator
2. Reporting rate: % of phishing attempts reported
3. Interaction rate: Fewer risky interactions over time
4. Ignore rate: Threats ignored or missed
5. Engagement trends: Team participation patterns

FAQ