Security.Rocks

Making security accessible.

Your team learns to recognize real attacks by experiencing them firsthand. Built by ethical hackers.

Scroll

There are plenty of technical measures. But people remain the weakest link.

Everyone is tired of phishing simulations. E-learnings get clicked away. Meanwhile, attacks are getting more personal: AI-generated voices, targeted social engineering, and deepfakes.

Your employees are increasingly targeted in their private lives. Data breaches expose personal information, which criminals combine with public data from LinkedIn. A targeted attack on someone's personal email or phone falls outside all your technical measures. And often serves as a stepping stone into your corporate environment.

You won't solve that with a PowerPoint. It requires something that truly sticks.

Voice phishing simulation

Your colleagues hear the CEO's voice, and are asked to make a transfer.

The Scam Phone simulates real voice phishing in the workplace. No screen, no e-learning. A phone that rings, a familiar voice, and a request that's just believable enough.

De Scam Phone met banner op een kantoorlocatie
01
record_voice_over

Load voices

We load the voice of your CEO, CFO, or IT manager onto the phone. Ready within a day.

02
power

Plug it in

The phone arrives by post. Set it down, plug it in, done. No IT connection needed.

03
groups

Experience it

Employees pick up and hear a familiar voice with a suspicious request. That's what they'll talk about.

assessment

Report for your board

Afterwards, you receive an awareness report: how many people picked up, how many conversations took place, and how many completed the full scenario. Ready to present to your board.

verified

If they don't talk about it, you don't pay.

That's our guarantee. We've never had to honor it.

More about the Scam Phonearrow_forward
format_quote

Outstanding results within a short timeframe. A comprehensive report with clear examples and CVSS scores. Communication and flexibility were top-notch.

Sander van de VenCISO
Track record

10 years, 150+ pentests, and more vulnerabilities found than cups of coffee we've had.

Experience

10+

Years in offensive security

Certified

OSCP

100% certified team

Track record

150+

Penetration tests performed

Fixed price

€0

In unexpected invoices

What we're proud of

Dutch COVID Tracer App

Critical vulnerabilities found in all prototypes. The ministry switched entirely to a new, more secure design.

King's Day Live

Threat model and security for the platform that hosted the Royal Family's livestream. Zero incidents.

SAP Security Researcher

Vulnerability found in SAP login functionality. Recognized as SAP Acknowledged Security Researcher.

VNG Hall of Fame

Vulnerability reported to the municipality of Utrecht. Inducted into the Hall of Fame of the Association of Dutch Municipalities.

Free

You don't spot real phishing by spelling mistakes.

Every month we break down a real phishing attack into a poster you can hang by the coffee machine. So your team learns to look at context, not typos.

Eén mail per maand, geen spam. Je kunt je altijd uitschrijven.

Curious how your colleagues will react?

Get in touch, no obligations.