{"id":939,"date":"2025-09-08T11:58:19","date_gmt":"2025-09-08T14:58:19","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/simulacoes-phishing-metricas-taxas-cliques-insuficientes\/"},"modified":"2025-11-02T18:15:51","modified_gmt":"2025-11-02T21:15:51","slug":"as-simulacoes-tradicionais-de-phishing-estao-te-enganando","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/as-simulacoes-tradicionais-de-phishing-estao-te-enganando\/","title":{"rendered":"As simula\u00e7\u00f5es tradicionais de phishing est\u00e3o te enganando: por que m\u00e9tricas de taxas de cliques s\u00e3o insuficientes?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As simula\u00e7\u00f5es tradicionais de phishing n\u00e3o revelam o verdadeiro n\u00edvel de preparo da sua empresa. Descubra por que a contagem de cliques \u00e9 insuficiente e como o PhishOS ajuda a medir, de fato, a capacidade dos colaboradores de identificar e reagir a ataques de engenharia social.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Seja apenas por compliance ou por uma preocupa\u00e7\u00e3o por ciberseguran\u00e7a, todos j\u00e1 nos deparamos com uma simula\u00e7\u00e3o tradicional de phishing. Aquele tradicional e-mail anunciando uma promo\u00e7\u00e3o ou com uma mensagem alarmante, pode trazer diversas consequ\u00eancias para empresas e institui\u00e7\u00f5es.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por\u00e9m, o que poucos reconhecem \u00e9 que as simula\u00e7\u00f5es tradicionais de phishing j\u00e1 n\u00e3o s\u00e3o t\u00e3o eficazes, e raramente medem o que realmente importa. Ao inv\u00e9s de conscientiza\u00e7\u00e3o, as simula\u00e7\u00f5es tradicionais trazem m\u00e9tricas pouco relevantes e causam medo, desmotiva\u00e7\u00e3o e at\u00e9 danos \u00e0 reputa\u00e7\u00e3o de empresas e institui\u00e7\u00f5es.<\/span><\/p>\n<h3><b>Quando o \u201ctreinamento\u201d vira problema<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Um caso emblem\u00e1tico sobre como simula\u00e7\u00f5es de phishing tradicionais podem afetar negativamente as institui\u00e7\u00f5es ocorreu em 2023. Uma universidade na Calif\u00f3rnia, realizou um teste de phishing em que o assunto do e-mail era: <\/span><i><span style=\"font-weight: 400;\">\u201cNotifica\u00e7\u00e3o de Emerg\u00eancia: Caso de Ebola no Campus\u201d.<\/span><\/i><span style=\"font-weight: 400;\"> O e-mail, que n\u00e3o passava de um teste, deixou alunos e funcion\u00e1rios em p\u00e2nico. E a que custo?<\/span><\/p>\n<h3><b>O problema das m\u00e9tricas tradicionais<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Em testes tradicionais de phishing, as m\u00e9tricas apenas revelam os usu\u00e1rios que clicaram e os usu\u00e1rios que n\u00e3o clicaram no e-mail de phishing. Por\u00e9m, essa m\u00e9trica sozinha abre margem para uma mir\u00edade de d\u00favidas, questionamentos e possibilidades.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uma taxa alta de usu\u00e1rios que n\u00e3o clicaram no phishing, n\u00e3o necessariamente quer dizer que a organiza\u00e7\u00e3o est\u00e1 segura por tabela. \u00c9 poss\u00edvel que os funcion\u00e1rios de uma empresa estejam t\u00e3o atarefados que nem tiveram tempo de clicar na mensagem, um grupo de funcion\u00e1rios ficou sabendo que o e-mail de phishing seria disparado, ou ent\u00e3o a tem\u00e1tica utilizada na simula\u00e7\u00e3o de phishing n\u00e3o era do interesse do usu\u00e1rio.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como exemplo disso, a Google passou em anos recentes a n\u00e3o aplicar mais os testes tradicionais de phishing. No seu blog oficial, a big tech anuncia e explica os motivos por tr\u00e1s da decis\u00e3o: <\/span><i><span style=\"font-weight: 400;\">\u201cEducar os funcion\u00e1rios sobre como alertar as equipes de seguran\u00e7a sobre ataques em andamento continua sendo um complemento valioso e essencial para uma postura hol\u00edstica de seguran\u00e7a. No entanto, n\u00e3o h\u00e1 necessidade de tornar isso um ato de confronto, e n\u00e3o ganhamos nada \u2018pegando\u2019  pessoas \u2018falhando\u2019 na tarefa\u201d<\/span><\/i><span style=\"font-weight: 400;\"> (diz a empresa no texto chamado <\/span><i><span style=\"font-weight: 400;\">\u201cOn Fire Drills and Phishing Tests\u201d<\/span><\/i><span style=\"font-weight: 400;\">).<\/span><\/p>\n<h3><b>A raiz do problema<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A raiz deste problema, de acordo com o fundador e CEO da Hacker Rangers Vinicius Perallis, est\u00e1 no afastamento da inten\u00e7\u00e3o principal das simula\u00e7\u00f5es de phishing que \u00e9 medir o n\u00edvel de prote\u00e7\u00e3o de uma empresa contra ataques de engenharia social. Empresas e institui\u00e7\u00f5es come\u00e7aram a usar simula\u00e7\u00f5es de phishing para conscientizar colaboradores. <\/span><i><span style=\"font-weight: 400;\">\u201cUma grande confus\u00e3o que se tem \u00e9 que a simula\u00e7\u00e3o de phishing e-mail \u00e9 usada para um prop\u00f3sito muito diferente do que o prop\u00f3sito para o qual ele nasceu e deveria se encaixar\u201d,<\/span><\/i><span style=\"font-weight: 400;\"> pontua Vin\u00edcius no Hacker Rangers Podcast.<\/span><\/p>\n<h3><b>A evolu\u00e7\u00e3o: NIST Phish Scale<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Pensando em todo esse cen\u00e1rio de questionamento dos m\u00e9todos mais tradicionais de aplica\u00e7\u00f5es de phishing. O National Institute of Standards and Technology (NIST) publicou em 2023, o guia <\/span><i><span style=\"font-weight: 400;\">NIST Phish Scale<\/span><\/i><span style=\"font-weight: 400;\">que traz orienta\u00e7\u00f5es sobre como reconhecer sinais de que um e-mail \u00e9 um phishing. O documento da NIST lista 23 tipos de sinais a serem verificados frente \u00e0 um e-mail suspeito.<\/span><\/p>\n<h3><b>PhishOS: a nova gera\u00e7\u00e3o de simula\u00e7\u00f5es de phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">E com tudo isso em mente, a Hacker Rangers criou o game <\/span><b>PhishOS<\/b><span style=\"font-weight: 400;\">, um simulador de phishing pensado inteiramente com base na NIST Phish Scale, e pensado para ir al\u00e9m da mera contagem de cliques. No PhishOS, os jogadores devem explicitar o <\/span><i><span style=\"font-weight: 400;\">porqu\u00ea<\/span><\/i><span style=\"font-weight: 400;\"> do e-mail ser ou n\u00e3o uma mensagem de phishing, onde existem 34 poss\u00edveis cen\u00e1rios a serem identificados pelos usu\u00e1rios.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Com PhishOS, cada simula\u00e7\u00e3o se transforma em um momento de educa\u00e7\u00e3o pr\u00e1tica. Os colaboradores aprendem a reconhecer sinais de perigo em um ambiente seguro, enquanto gestores ganham m\u00e9tricas precisas sobre o comportamento e a evolu\u00e7\u00e3o da equipe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Est\u00e1 na hora de deixar para tr\u00e1s as simula\u00e7\u00f5es ultrapassadas e adotar uma abordagem que realmente transforma comportamento.Com o PhishOS, voc\u00ea evolui de simples \u201ccontagem de cliques\u201d para uma estrat\u00e9gia inteligente, educativa e engajadora. <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/phishos\/\">Teste o PhishOS por 30 dias gratuitos<\/a> e descubra como transformar simula\u00e7\u00f5es em resultados reais para sua empresa.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>As simula\u00e7\u00f5es tradicionais de phishing n\u00e3o revelam o verdadeiro n\u00edvel de preparo da sua empresa. Descubra por que a contagem de cliques \u00e9 insuficiente e como o PhishOS ajuda a medir, de fato, a capacidade dos colaboradores de identificar e reagir a ataques de engenharia social.<\/p>","protected":false},"author":4009,"featured_media":943,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[41],"tags":[],"class_list":["post-939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/as-simulacoes-tradicionais-de-phishing-estao-te-enganando\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-08T14:58:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-02T21:15:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient\",\"datePublished\":\"2025-09-08T14:58:19+00:00\",\"dateModified\":\"2025-11-02T21:15:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"articleSection\":[\"Phishing\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\",\"name\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"datePublished\":\"2025-09-08T14:58:19+00:00\",\"dateModified\":\"2025-11-02T21:15:51+00:00\",\"description\":\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","description":"As simula\u00e7\u00f5es tradicionais de phishing n\u00e3o revelam o verdadeiro n\u00edvel de preparo da sua empresa. Descubra por que a contagem de cliques \u00e9 insuficiente e como o PhishOS ajuda a medir, de fato, a capacidade dos colaboradores de identificar e reagir a ataques de engenharia social.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","og_description":"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/as-simulacoes-tradicionais-de-phishing-estao-te-enganando\/","og_site_name":"Hacker Rangers","article_published_time":"2025-09-08T14:58:19+00:00","article_modified_time":"2025-11-02T21:15:51+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","type":"image\/jpeg"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient","datePublished":"2025-09-08T14:58:19+00:00","dateModified":"2025-11-02T21:15:51+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"},"wordCount":571,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","articleSection":["Phishing"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","url":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","name":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","datePublished":"2025-09-08T14:58:19+00:00","dateModified":"2025-11-02T21:15:51+00:00","description":"As simula\u00e7\u00f5es tradicionais de phishing n\u00e3o revelam o verdadeiro n\u00edvel de preparo da sua empresa. Descubra por que a contagem de cliques \u00e9 insuficiente e como o PhishOS ajuda a medir, de fato, a capacidade dos colaboradores de identificar e reagir a ataques de engenharia social.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","width":2560,"height":1707,"caption":"phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=939"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/943"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}