This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing simulations. It defines the user actions that trigger each status and describes when additional training is assigned.
Email Sent
Email Opened
Clicked Link
Submitted Data
CyberHoot automatically assigns remedial training when users demonstrate risky behavior:
Simply opening the email does not trigger training, since users may preview messages in the normal course of work.
Training is assigned as a short, targeted awareness assignment, reinforcing how to spot phishing attempts and reminding users not to click or submit information.
Metrics may underreport “opens” if users block image loading in their mail client.
Clicking a link is the most reliable indicator of risky behavior, since it requires an intentional user action.
Submitted data represents the most severe failure point and is treated as a critical incident for awareness training.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....
Read more
Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...
Read more
If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
