Ninjio Videos

(Accredited NINJIO partner with all video content hosted and delivered by Cyber Risk Aware)
3-4 minute-long animated episodes based on or inspired by a real company who has suffered a significant security breach. These episodes are created and distributed every 30 days in order to educate employees about the dangers that exist in cyber security.

Season 1 – 2016

  • Season 1, Episode 1: Drive Bye
    (This episode is inspired by the Jeep/Chrysler attack and teaches about USB Security)
  • Season 1, Episode 2: Amber Ashlynn pt 1
    (This episode is inspired by the Ashley Madison attack and teaches about Social Engineering through Social Media)
  • Season 1, Episode 3: Amber Ashlynn pt 2
    (This episode is inspired by the Ashley Madison attack and teaches about MS Word Document Attacks)
  • Season 1, Episode 4: Sunny Phishing
    (This episode is inspired by the Sony Pictures attack and teaches about spear phishing)
  • Season 1, Episode 5: Turbine Twist
    (This episode is inspired by the American Super Conductor attack and teaches about Password Security)
  • Season 1, Episode 6: Hospital Hijinks
    (This episode is inspired by the Hollywood Presbyterian Medical Center attack and teaches about Ransomware)
  • Season 1, Episode 7: The W2 Heist
    (This episode is inspired by the Sprouts Farmers Market attack and teaches about W-2 scams)
  • Season 1, Episode 8: Catfishing
    (This episode is inspired by multiple online dating sites and talks about Cat fishing scams)
  • Season 1, Episode 9: The Wi-Fi Trap
    (This episode is inspired by the LinkedIn breach and teaches about Public Wi-Fi Security)
  • Season 1, Episode 10: The Great Password Breach
    (This episode is inspired by the Anthem breach and teaches about Telephone Social Engineering)
  • Season 1, Episode 11: Hack the Vote
    (This episode is our first fictional episode and depicted a scenario where voting booths were hacked during the Presidential Election. This teaches about the “Microsoft Support Scam”)
  • Season 1, Episode 12: The Wahoo Waterhole
    (This episode is inspired by the Yahoo! Breach that occurred in September of 2016 and teaches about Watering Hole Attacks)

Season 2 – 2017

  • Season 2, Episode 1: Cyber Oil Warfare
    (This episode is inspired by the Saudi Aramco hack (the most expensive hack in cyber history) and teaches about Badge Surfing and a Clean Desk Policy)
  • Season 2, Episode 2: The Homeless Homebuyer
    (This episode is inspired by the many wire fraud incidents that happen every day. This Episode teaches about using verbal authorization on any transfer of funds)
  • Season 2, Episode 3: Slippery Side Loading
    (This episode is inspired by the Googlian Attack and teaches about the dangers of Side Loading Mobile Apps)
  • Season 2, Episode 4: IoT Gone Wild
    (This episode in inspired by the DYN DNS attack and teaches about changing your default username and password on IOT Devices)
  • Season 2, Episode 5: The Ransomware Pyramid Scheme
    (This episode in based on a Ransomware variant in production gives you an option to pay the ransom, or infect two other people to get you unlocked for free.)
  • Season 2, Episode 6: My Password is Password
    (This episode is based on the McDonald’s twitter hack and features bad/reused passwords and talks about passphrases and two-factor authentication)
  • Season 2, Episode 7: 156 Alarms
    (This episode is based on the Dallas Sirens and features Spear Phishing)
  • Season 2, Episode 8: ElectroSign of Things to Come
    (This episode is based on the DocuSign hack and covers business email compromise)
  • Season 2, Episode 9: Pension Plan Telescam
    (This episode is based on caller ID scams and covers telephone spoofing)
  • Season 2, Episode 10: Beware of the Insider
    (This episode is based on the Google/Uber IP lawsuit and covers malicious insider threats)
  • Season 2, Episode 11: Juice Jacking
    (This episode is based on the Equifax breach and covers phone charging hacks)
  • Season 2, Episode 12: Mis-Delivery
    (This episode is based on email misdelivery and covers accidental insider threats and email misdelivery)

Season 3 – 2018

  • Season 3, Episode 1: Phishing the Stream
    (This episode is inspired by Netflix phishing emails and teaches about Phishing and Identity Theft)
  • Season 3, Episode 2: Laid Off, Paid Off
    (This episode is inspired by the Uber nondisclosure of a hack. This Episode teaches about securely workingfrom home and VPN security)
  • Season 3, Episode 3: Chicken or Smish
    (This episode is inspired by text message phishing schemes. This Episode teaches about smishing)
  • Season 3, Episode 4: 2 Factor Fake Out
    (This episode is inspired schemes used to subvert 2FA via SMS. This Episode teaches about 2FA security)
  • Season 3, Episode 5: The Macro Trojan Takedown
    (This episode is inspired by the Boryspil Airport attack and teaches about macro malware)
  • Season 3, Episode 6: Ransomware is Everywhere – CORE 4
    (This episode is inspired by the City of Atlanta attack and teaches about ransomware)
  • Season 3, Episode 7: Update Double Take
    (This episode is inspired by the malicious ad-results and teaches about malvertising)
  • Season 3, Episode 8: Cryptominer Pants on Fire
    (This episode is inspired cryptomining and teaches about cryptojacking)
  • Season 3, Episode 9: Strawberry X Forever
    (This episode is inspired by the US Navy hack and teaches about small devices used to exploit Wi-Fi
    networks)
  • Season 3, Episode 10: A Terminal Mistake – CORE 4
    (This episode is inspired by the SingHealth breach and teaches about spear phishing)
  • Season 3, Episode 11: Data Loss by the Logger
    (This episode is inspired by the Zoho hacks and teaches about keystroke loggers)
  • Season 3, Episode 12: Your Page is My Page – CORE 4
    (This episode is inspired by the Facebook breach and teaches about password security)

Season 4 – 2019

  • Season 4, Episode 1: You Never Call… – CORE 4
    (This episode is inspired by Cathay Pacific breach and teaches about Business Email Compromise)
  • Season 4, Episode 2: C’est La Vie, Chamonix
    (This episode is inspired by Marriott breach and teaches about Mobile Device Management)
  • Season 4, Episode 3: Up, Upvote, and Away
    (This episode is inspired by insider breaches and teaches about Data Classification)
  • Season 4, Episode 4: It’s Not What You Think…
    (This episode is inspired by blackmail scams and teaches about Verifying Email Spoofing)
  • Season 4, Episode 5: Say It, Don’t Spray It
    (This episode is inspired by the Citrix breach and teaches about Password Spraying)

More to come………

Menu

We use cookies to create a secure and effective website for our customers and enhance your browsing experience. By using this site you agree that we may store and access cookies on your device, unless you have disabled your cookies