Cybersecurity Labs

Compare how different AI tools handle cybersecurity scenarios

How to Use These Labs

  1. Select a lab scenario from the list below
  2. Copy the prompt using the button provided
  3. Open each AI tool and paste the same prompt
  4. Compare responses using the evaluation criteria
  5. Note differences in accuracy, depth, and safety considerations

Select a Lab

Phishing Email Detection

Test how each AI identifies and explains phishing attempts in suspicious emails

Beginner
Threat Detection

Test Prompt

Analyze this email for phishing indicators and explain your reasoning:

Subject: URGENT: Your account will be suspended!
From: security@amaz0n-support.com

Dear Valued Customer,

We have detected unusual activity on your account. Your account will be suspended within 24 hours unless you verify your information immediately.

Click here to verify: http://amaz0n-verify.suspicious-site.com/login

Please provide your:
- Full name
- Credit card number
- Social Security Number
- Account password

Failure to respond will result in permanent account termination.

Amazon Security Team

Evaluation Criteria

Compare responses across AI tools using these criteria:

  • 1
    Identifies the spoofed sender domain (amaz0n vs amazon)
  • 2
    Flags the urgency tactics as a red flag
  • 3
    Notes the suspicious URL
  • 4
    Warns about requests for sensitive information
  • 5
    Explains social engineering techniques used

Tips for Comparison

  • Use the exact same prompt for fair comparison
  • Note which tools refuse certain requests for safety reasons
  • Consider accuracy, completeness, and practical applicability
  • Pay attention to disclaimers and caveats each AI provides