Over 250 new and updated phishing kits in 2025

December 31
Enhancement
BullPhish ID, Kaseya 365 User

BullPhish ID now offers over 250 new phishing kits released throughout 2025, giving you a broader range of realistic scenarios to test and train end users. These kits reflect current phishing tactics and regional brands, so simulations better match what users see in their actual inboxes. 

The new content spans multiple languages, including English, Canadian French, Spanish, Portuguese, Swedish, Dutch and German, with additional templates tailored to well-known Canadian brands. This mix of global and region-specific content helps you run targeted campaigns for different clients and user groups without building templates from scratch. 

With more localized, relevant simulations, you can drive higher engagement, surface true risk levels across your tenants, and deliver more effective remedial training. This helps reduce successful phishing attempts, strengthens security awareness programs, and demonstrates ongoing value to your clients. 

Learn more about expanded multilingual phishing kits for BullPhish ID here. 

One complete platform for IT & security management

Kaseya 365 is the all-in-one solution for managing, securing, and automating IT. With seamless integrations across critical IT functions, it simplifies operations, strengthens security, and boosts efficiency.

Backup verification just got smarter: Introducing AI-powered screenshot verification

In an era of relentless cyberattacks, infrastructure complexity and rising client expectations, simply having backups is no longer enough. BackupsRead More

Read blog post

A better IT Glue experience: UX updates for faster, smarter workflows

Explore the latest IT Glue UX updates designed to simplify workflows, improve usability and help teams access and manage documentation faster.

Read blog post

QBR report templates: Deliver consistently professional QBRs with standardized templates

If you’ve ever built a Quarterly Business Review (QBR) from scratch — again and again — you already know theRead More

Read blog post