{"version":"1.0","provider_name":"Hacker Rangers","provider_url":"https:\/\/hackerrangers.siteup.dev\/es","author_name":"Hacker Rangers","author_url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/","title":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"D63FgA6BEA\"><a href=\"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\">Las simulaciones tradicionales de phishing te est\u00e1n enga\u00f1ando: por qu\u00e9 las m\u00e9tricas de tasas de clics son insuficientes<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/embed\/#?secret=D63FgA6BEA\" width=\"600\" height=\"338\" title=\"\u00abTraditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient\u00bb \u2014 Hacker Rangers\" data-secret=\"D63FgA6BEA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1707,"description":"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks."}