CyberHoot Newsletter – Q1 2024 January, February, March

7th May 2024 | Blog, Newsletters CyberHoot Newsletter – Q1 2024 January, February, March

“CyberHoot’s Newsletter has been on a brief hiatus as we focused on critical product improvements, finished 2024 strategic planning, and addressed performance improvements.  This newsletter is chock full of cyber news, contains a new section on recently added features, and a video interview of Craig on crazy hacking stories he’s experienced. We hope you enjoy this newsletter and stay tuned for monthly newsletters throughout 2024.”  – – Craig

March 2024


The Evolution of Phishing: SMS and Voice-Based Attacks

The Latest Trends in Phishing Attacks: Phishing attacks are evolving to include SMS and voice-based tactics. Understand how cybercriminals are adapting their methods and learn valuable insights to protect yourself and your organization from these sophisticated scams. Read now.


Five Easy Steps to Boost Your Cybersecurity

Boost your Cybersecurity: Discover simple yet effective strategies to enhance your cybersecurity defenses in this quick article. Explore actionable tips that anyone can implement to strengthen defenses against cyber attacks.  Read now.


Understanding Privileged User Management (PUM) vs. Privileged Access Management (PAM)

PUM vs. PAM: Learn the key differences between Privileged User Management (PUM) and Privileged Access Management (PAM). Secure critical systems and data by understanding each approach from this concise read on privileged user management. Read now.


Privileged Access Management

Bridging the Gap: Superuser Protection for SMBs and MSPs

How to Bridge the Security Gap: Learn actionable insights to enhance security protocols, safeguard sensitive data, and bolster defenses against cyber threats. Dive into this essential read to empower your organization with effective strategies for comprehensive protection. Read now.

February 2024


Safeguarding Your SMB or MSP Against Deepfake Cybercrime: Insights from Hong Kong

Learn Essential Strategies: How to protect your SMB or MSP from deepfake threats. Gain actionable insights from real world experiences and fortify your defenses against cybercrime. Stay ahead in safeguarding your organization’s integrity. Read now.


Document.Cookies Session ID Stealing Phishing Attacks Growing

Microsoft Executive Email Breach: Lessons for SMBs and MSPs

Microsoft Breach: The breach of Microsoft Executive email accounts is a potent reminder that anyone can be hacked.  Dive into this essential guide to gain actionable strategies to strengthen your cybersecurity defenses and safeguard your digital assets. Read now.


Mega-Breach: The Impact of 26 Billion Leaked Credentials

Largest Data Breach in History: Billions of passwords and credentials flood the dark web leading to breaches like Change Healthcare.  Explore crucial strategies to safeguard against credential-based cyber threats. Our analysis will help you understand the true scale of the problem and arm you with the keys to protecting your digital identity. Read now.

January 2024


Hackers target you to "Borrow" your phone and drain your Bank Account.

Peer-to-Peer (P2P) Payment Scams (Part 2)

Digital Danger Alert: Hackers and jilted lovers exploit cash apps to drain your bank account! Unravel the unsettling tactics infiltrating popular money transfer platforms, turning your phone into a gateway for unauthorized funds transfers.  Read now.  (Payment Scams – Part 1)


AI in Cybersecurity - benefits and limitations

AI in Cybersecurity: Enhancing Threat Detection and Response

Transformative Power Unleashed: How AI Redefines Cybersecurity for MSPs and SMBs. Explore the cutting-edge landscape where Artificial Intelligence becomes the linchpin, revolutionizing threat detection and response to provide an unparalleled advantage in the dynamic world of cybersecurity. Read now.


Peer-to-peer Payment Scams on the Rise with Zelle and others.

Peer-to-Peer (P2P) Payment Scams to Watch Out For

Danger in the Digital Wallet: P2P Payment Scams Surge Amidst Advanced Social Engineering. As financial losses mount, a chilling rise in sophisticated tactics leaves users vulnerable, highlighting the urgent need for heightened awareness and security measures in the realm of peer-to-peer transactions. Read now.


2024 Cybersecurity Predictions

Top 10 Cybersecurity Trends and Strategies in 2024

2024 Unfolding with Promise: Small to Medium sized Businesses face a critical imperative – fortify cybersecurity defenses now! The surge in hacker attacks throughout 2023 signals an urgent call for businesses to proactively strengthen their defenses, emphasizing the need for comprehensive employee training and cyber literacy skills to weather the escalating digital threats ahead. Read now.


HootPhish Press Release

Customer Spotlight


CyberHoot Awarded Badge From TrustRadius


Cybrary Term of the Month

Peer-to-Peer (P2P) Network


Peer-to-Peer (P2P) Networks exist where groups or “peers” of computer systems are linked to each other through the Internet for a common purpose usually with a common application directing their use. Files can be shared directly between systems on the P2P network without the need for a central server. In other words, each computer on a P2P network becomes a file server of sorts, while also acting as a client.


Explore CyberHoot’s Extensive 950+ Term Cybersecurity Library

Recently Added Features

New “Release Notes” Feature Added to Admin Dropdown!

We are excited to now be publishing our weekly release notes within the CyberHoot Admin Interface to all Super-Users.  Simply log into your CyberHoot Platform, click on Admin in the top right, and then select “Release Notes” Under your “Site Admin” section.  You can now stay up on all the new improvements we have released within CyberHoot each week.

Power Release Notes:
  • Enabled domain-wide dark web searches for customers.
  • Added tips to phishing simulation results for end user feedback.
  • Performance improvements across the platform.
  • Mobile device display improvements.
  • Updated Phish test instructions landing page.
  • Schedule compliance reports by email feature added.
  • Added Typo-Squatted domains to Cybersecurity Scorecard Report helping MSPs prospect for new customers.
  • Add the ability to mass update users and customers (archive, restore etc.)
Autopilot Release Notes
  • Performance improvements across the platform.
  • Added Dark Web exposure acknowledgements.
  • Added valid domain check to Dark Web reports using DeHashed.
  • Added tips to phishing simulation results for end-user feedback.
  • Enabled admins ability to disable/reset other admins Two-Factor verification.
  • Mobile device display improvements.
  • Add the ability to mass update users (multiselect for archive, restore etc.).
  • Added aggregate MSP customer compliance reports and scheduling.
HootPhish Release Notes
  • Released HootPhish stand-alone product to the Partner community.
  • Added tips to phishing simulation results for end-user feedback.
  • Improved display on mobile clients.
  • Added ability for admins to disable/reset other admins Two-Factor verification.
  • Added the ability to mass update users.
  • Added new link variable to messaging and updated HootPhish instructions to use link variable for overview video.
  • Added end-user acknowledgement popup when retaking phishing assignments.

Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.

Referral through Autopilot’s Dashboard:

Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.

CyberHoot’s Social Media

Join CyberHoot’s subreddit to stay updated in the world of cybersecurity!


Crazy Hacking Stories from CyberHoot’s Co-Founder

Email based authentication for Training.

Instant Access

CyberHoot provides password-less access. End user frustration accessing training is gone. Click an email link for instant access!

Email Based Assignments

Automatic
Compliance

Employee reminders to manager escalations, CyberHoot delivers automated, hands-off, extremely high compliance.

Manager Escalations

Product Training

CyberHoot includes limitless product training for your IT Projects. Teach users how to use new software on their terms how they want to learn.

Micro Training

Cyber”Hoots” are 5 minutes or less ensuring your staff get trained quickly and effectively.

The Power of Open

CyberHoot is an open. Any video or PDF can train and govern your employees.

Effective

Many clients routinely achieve 90% or greater compliance to policies, training, and phish testing.

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more