Cybersecurity skill game
Phishing Detector.
Read each cybersecurity email like an analyst on shift. Call it phishing, suspicious, or legitimate. After every verdict, a tradecraft breakdown explains what you saw, what you missed, and why it matters in real incident response work.
Email 1 of 8
Score: 0
Invoice 47821 โ please review and sign
From: Accounts Payable <billing@vendor-portal.app>
To: you@example.com ย ยทย Today 07:13
Hello,
The attached invoice requires your signature before payment can be processed. Please review and sign within 24 hours to avoid service disruption.
If you have questions, reply to this email and our billing team will assist.
Hover preview โ actual link targets
Review invoice in DocuSign โ https://docu-sign.app/envelope/47821-pdf-secure
How to read the verdicts
Phishing means there is enough evidence in the visible email to conclude malicious intent: a lookalike sender domain, a credential-harvester link, a financial-fraud pattern, or a clear pretext.
Suspicious means the email may be malicious but cannot be confirmed from the email alone. Real analyst behavior here is to verify out-of-band, check headers and SPF/DKIM/DMARC, and not click. Suspicious is the right call when the email pattern is ambiguous.
Legitimate means the sender, link target, tone, and request all align with a normal communication from the claimed source. Phishers imitate these patterns, so being able to recognize the real thing is half the cybersecurity skill.
Definitions are original explanations written for career development purposes. For authoritative technical definitions, refer to NIST, ISO, or the relevant standards body.