Cybersecurity Labs
Compare how different AI tools handle cybersecurity scenarios
How to Use These Labs
- Select a lab scenario from the list below
- Copy the prompt using the button provided
- Open each AI tool and paste the same prompt
- Compare responses using the evaluation criteria
- Note differences in accuracy, depth, and safety considerations
Select a Lab
Phishing Email Detection
Test how each AI identifies and explains phishing attempts in suspicious emails
Threat Detection
Test Prompt
Analyze this email for phishing indicators and explain your reasoning: Subject: URGENT: Your account will be suspended! From: security@amaz0n-support.com Dear Valued Customer, We have detected unusual activity on your account. Your account will be suspended within 24 hours unless you verify your information immediately. Click here to verify: http://amaz0n-verify.suspicious-site.com/login Please provide your: - Full name - Credit card number - Social Security Number - Account password Failure to respond will result in permanent account termination. Amazon Security Team
Evaluation Criteria
Compare responses across AI tools using these criteria:
- 1Identifies the spoofed sender domain (amaz0n vs amazon)
- 2Flags the urgency tactics as a red flag
- 3Notes the suspicious URL
- 4Warns about requests for sensitive information
- 5Explains social engineering techniques used
Tips for Comparison
- •Use the exact same prompt for fair comparison
- •Note which tools refuse certain requests for safety reasons
- •Consider accuracy, completeness, and practical applicability
- •Pay attention to disclaimers and caveats each AI provides